CVE-2024-29009
Description
Cross-site request forgery (CSRF) vulnerability in easy-popup-show all versions allows a remote unauthenticated attacker to hijack the authentication of the administrator and to perform unintended operations if the administrator views a malicious page while logged in.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CSRF vulnerability in easy-popup-show WordPress plugin allows attackers to hijack admin sessions and perform unintended actions via malicious pages.
The WordPress plugin "easy-popup-show" contains a cross-site request forgery (CSRF) vulnerability. An unauthenticated attacker can leverage this flaw to hijack the authentication of an administrator if the administrator visits a specially crafted malicious page while logged in [1]. The vulnerability is present in all versions of the plugin.
The attack surface is the WordPress admin interface, where a logged-in administrator may be tricked into clicking a link or viewing a page that triggers unwanted actions. No authentication is required from the attacker, but the attack relies on social engineering to make the administrator interact with the malicious page [1].
Successful exploitation could allow the attacker to perform unintended operations with administrative privileges. This may include creating new admin accounts, modifying site settings, or installing malicious plugins, effectively compromising the entire WordPress site.
The developer has stated that the plugin is no longer supported, and it has been closed as of April 11, 2022 [2]. Users are advised to stop using the plugin immediately [1]. No patch is available, and the product is effectively end-of-life.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.