4.3

CVE-2024-31386

Multiple Themes (Various Versions) - Cross-Site Request Forgery to Notice Dismissal

Cross-Site Request Forgery (CSRF) vulnerability in Hidekazu Ishikawa X-T9, Hidekazu Ishikawa Lightning, themeinwp Default Mag, Out the Box Namaha, Out the Box CityLogic, Marsian i-max, Jetmonsters Emmet Lite, Macho Themes Decode, Wayneconnor Sliding Door, Out the Box Shopstar!, Modernthemesnet Gridsby, TT Themes HappenStance, Marsian i-excel, Out the Box Panoramic, Modernthemesnet Sensible WP.This issue affects X-T9: from n/a through 1.19.0; Lightning: from n/a through 15.18.0; Default Mag: from n/a through 1.3.5; Namaha: from n/a through 1.0.40; CityLogic: from n/a through 1.1.29; i-max: from n/a through 1.6.2; Emmet Lite: from n/a through 1.7.5; Decode: from n/a through 3.15.3; Sliding Door: from n/a through 3.3; Shopstar!: from n/a through 1.1.33; Gridsby: from n/a through 1.3.0; HappenStance: from n/a through 3.0.1; i-excel: from n/a through 1.7.9; Panoramic: from n/a through 1.1.56; Sensible WP: from n/a through 1.3.1.

Mögliche Gegenmaßnahme
CityLogic: Update to version 1.1.30, or a newer patched version
Decode: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Default Mag: Update to version 1.3.6, or a newer patched version
Emmet Lite: Update to version 1.7.8, or a newer patched version
Gridsby: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
HappenStance: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
i-excel: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
i-max: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Lightning: Update to version 15.19.0, or a newer patched version
Namaha: Update to version 1.0.41, or a newer patched version
Panoramic: Update to version 1.1.57, or a newer patched version
Sensible WP: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Shopstar!: Update to version 1.1.34, or a newer patched version
Sliding Door: Update to version 3.4, or a newer patched version
X-T9: Update to version 1.19.1, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemWordPress Theme
Produkt CityLogic
Version [*, 1.1.30)
SystemWordPress Theme
Produkt Decode
Version *-3.15.3
SystemWordPress Theme
Produkt Default Mag
Version [*, 1.3.6)
SystemWordPress Theme
Produkt Emmet Lite
Version [*, 1.7.8)
SystemWordPress Theme
Produkt Gridsby
Version *-1.3.0
SystemWordPress Theme
Produkt HappenStance
Version *-3.0.1
SystemWordPress Theme
Produkt i-excel
Version *-1.7.9
SystemWordPress Theme
Produkt i-max
Version *-1.6.2
SystemWordPress Theme
Produkt Lightning
Version *-15.18.0
SystemWordPress Theme
Produkt Namaha
Version [*, 1.0.41)
SystemWordPress Theme
Produkt Panoramic
Version [*, 1.1.57)
SystemWordPress Theme
Produkt Sensible WP
Version *-1.3.1
SystemWordPress Theme
Produkt Shopstar!
Version [*, 1.1.34)
SystemWordPress Theme
Produkt Sliding Door
Version [*, 3.4)
SystemWordPress Theme
Produkt X-T9
Version [*, 1.19.1)
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerHidekazu Ishikawa
Produkt X-T9
Default Statusunaffected
Version <= 1.19.0
Version n/a
Status affected
HerstellerHidekazu Ishikawa
Produkt Lightning
Default Statusunaffected
Version <= 15.18.0
Version n/a
Status affected
Herstellerthemeinwp
Produkt Default Mag
Default Statusunaffected
Version <= 1.3.5
Version n/a
Status affected
HerstellerOut the Box
Produkt Namaha
Default Statusunaffected
Version <= 1.0.40
Version n/a
Status affected
HerstellerOut the Box
Produkt CityLogic
Default Statusunaffected
Version <= 1.1.29
Version n/a
Status affected
HerstellerMarsian
Produkt i-max
Default Statusunaffected
Version <= 1.6.2
Version n/a
Status affected
HerstellerJetmonsters
Produkt Emmet Lite
Default Statusunaffected
Version <= 1.7.5
Version n/a
Status affected
HerstellerMacho Themes
Produkt Decode
Default Statusunaffected
Version <= 3.15.3
Version n/a
Status affected
HerstellerWayneconnor
Produkt Sliding Door
Default Statusunaffected
Version <= 3.3
Version n/a
Status affected
HerstellerOut the Box
Produkt Shopstar!
Default Statusunaffected
Version <= 1.1.33
Version n/a
Status affected
HerstellerModernthemesnet
Produkt Gridsby
Default Statusunaffected
Version <= 1.3.0
Version n/a
Status affected
HerstellerTT Themes
Produkt HappenStance
Default Statusunaffected
Version <= 3.0.1
Version n/a
Status affected
HerstellerMarsian
Produkt i-excel
Default Statusunaffected
Version <= 1.7.9
Version n/a
Status affected
HerstellerOut the Box
Produkt Panoramic
Default Statusunaffected
Version <= 1.1.56
Version n/a
Status affected
HerstellerModernthemesnet
Produkt Sensible WP
Default Statusunaffected
Version <= 1.3.1
Version n/a
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.47% 0.637
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
audit@patchstack.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.