CVE-2024-9943

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.4. This is due to missing or incorrect nonce validation on several functions in api/class-mvx-rest-controller.php. This makes it possible for unauthenticated attackers to update vendor account details, create vendor accounts, and delete arbitrary users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 16:57

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L5258 - () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L5258 - Product
References () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6009 - () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6009 - Product
References () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6155 - () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6155 - Product
References () https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/api/class-mvx-rest-controller.php?old=3168957&old_path=dc-woocommerce-multi-vendor%2Ftrunk%2Fapi%2Fclass-mvx-rest-controller.php - () https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/api/class-mvx-rest-controller.php?old=3168957&old_path=dc-woocommerce-multi-vendor%2Ftrunk%2Fapi%2Fclass-mvx-rest-controller.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/b950faf9-2122-42af-9f05-ec850767be32?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/b950faf9-2122-42af-9f05-ec850767be32?source=cve - Third Party Advisory
First Time Multivendorx
Multivendorx multivendorx
CPE cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) El complemento MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.2.4 incluida. Esto se debe a la falta o la validación incorrecta de nonce en varias funciones en api/class-mvx-rest-controller.php. Esto hace posible que atacantes no autenticados actualicen los detalles de la cuenta del proveedor, creen cuentas de proveedor y eliminen usuarios arbitrarios a través de una solicitud falsificada, siempre que puedan engañar a un administrador del sitio para que realice una acción como hacer clic en un enlace.

24 Oct 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-24 08:15

Updated : 2025-06-05 16:57


NVD link : CVE-2024-9943

Mitre link : CVE-2024-9943

CVE.ORG link : CVE-2024-9943


JSON object : View

Products Affected

multivendorx

  • multivendorx
CWE
CWE-352

Cross-Site Request Forgery (CSRF)