cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-0431,https://securityvulnerability.io/vulnerability/CVE-2024-0431,Cross-Site Request Forgery Vulnerability in Gestpay for WooCommerce Plugin,"The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_set_default_card' function. This makes it possible for unauthenticated attackers to set the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",Wordpress,Gestpay For WooCommerce,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-28T08:33:10.023Z,0 CVE-2024-0432,https://securityvulnerability.io/vulnerability/CVE-2024-0432,Cross-Site Request Forgery Vulnerability in Gestpay for WooCommerce Plugin,"The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_delete_card' function. This makes it possible for unauthenticated attackers to delete the default card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",Wordpress,Gestpay For WooCommerce,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-28T08:33:09.057Z,0 CVE-2024-0433,https://securityvulnerability.io/vulnerability/CVE-2024-0433,Cross-Site Request Forgery Vulnerability in Gestpay for WooCommerce Plugin,"The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 20221130. This is due to missing or incorrect nonce validation on the 'ajax_unset_default_card' function. This makes it possible for unauthenticated attackers to remove the default status of a card token for a user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",Wordpress,Gestpay For WooCommerce,4.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-28T08:33:07.069Z,0