VulnerAlert



WORDPRESS
15-07-2024 14:14
Tags
#wordpress
#site
#cross
#plugin
#wp
#cross-site
#/cross(.*)cross/iU
#cross cross
#vulnerable
#critic
#critical
#important
#attack
#allow
#issue
#csrf
#vulnerability
#security
Descripción
Matomo Analytics <= 5.1.1 - Cross-Site Request Forgery to Notice Dismissal https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/matomo/matomo-analytics-511-cross-site-request-forgery-to-notice-dismissal
4.3
Cross-Site Request Forgery (CSRF)
CVE CVE-2024-38766
CVSS 4.3 (Medium)
Publicly Published July 12, 2024
Last Updated July 15, 2024
Researcher Dhabaleshwar Das

Description

The Matomo Analytics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to dismiss notices via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

References

Share

Vulnerability Details for Matomo Analytics – Ethical Stats. Powerful Insights.

Software Type Plugin
Software Slug matomo (view on wordpress.org)
Patched? No
Remediation No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Affected Version
  • <= 5.1.1

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation

by OpenAI
This security information situation involves a vulnerability in the Matomo Analytics plugin for WordPress versions up to 5.1.1. The is Cross-Site Request Forgery (CSRF) issue that allows an attacker trick user into unknowingly performing actions on website without their consent. In this specific case, dismiss important notices user's knowledge or consent. This could potentially lead missing critical alerts updates, leaving vulnerable attacks. To mitigate vulnerability, it recommended update latest version available. Additionally, users should be cautious when clicking links buttons websites, especially prompted notices. Regularly monitoring and staying informed about updates vulnerabilities also ensure safety of your website.

Informe ejecutivo
Informe de Ciberseguridad
Fecha:
Asunto: Vulnerabilidad en el plugin Matomo Analytics para WordPress Resumen : La situación seguridad informática actual involucra una vulnerabilidad las versiones WordPress hasta la 5.1.1. La es un problema Cross-Site Request Forgery (CSRF) que permite a atacante engañar usuario realice acciones sitio web sin su consentimiento. En este caso específico, descartar avisos importantes conocimiento o consentimiento del usuario. Esto podría llevar potencialmente pierda alertas críticas actualizaciones, dejando vulnerable ataques. Para mitigar esta vulnerabilidad, se recomienda actualizar última versión disponible. Además, los usuarios deben ser cautelosos al hacer clic enlaces botones sitios web, especialmente cuando les solicite seguridad. También importante monitorear regularmente y mantenerse informado sobre actualizaciones vulnerabilidades garantizar web.

Recomendación


Recomendaciones:
1. Actualizar el plugin de Matomo Analytics a la última versión disponible lo antes posible para mitigar vulnerabilidad identificada.
2. Educar los usuarios sobre importancia no hacer clic en enlaces o botones sospechosos sitios web, especialmente cuando se les solicite descartar avisos seguridad.
3. Mantenerse informado actualizaciones seguridad y vulnerabilidades relacionadas con plugins herramientas utilizadas sitio web.
4. Implementar medidas adicionales, como firewalls, antivirus sistemas detección intrusiones, proteger web posibles ataques.
5. Realizar análisis periódicos identificar tomar correctivas manera proactiva.
Link externo
Ver detalles

Fuente
https://www.wordfence.com/threat-intel/vulnerabilities/
Resultados similares
Coincidentes en almenos en 50% de los tags
12-03-2026 CVE-2026-2687
The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its ...
Ver información
12-03-2026 CVE-2025-15473
The Timetics WordPress plugin before 1.0.52 does not have authorization in a REST endpoint, al...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por