
Cloud Vulnerability DB
A community-led vulnerabilities database
The Cross-Site Request Forgery (CSRF) vulnerability was identified in WpDevArt Organization chart plugin versions 1.4.4 and below. The vulnerability was discovered on January 27, 2023, and was assigned CVE-2023-24384. This security issue affects WordPress installations using the vulnerable versions of the Organization chart plugin (WPScan, Patchstack).
The vulnerability stems from the absence of CSRF protection mechanisms in certain plugin functionalities. Specifically, the plugin lacks CSRF checks when performing operations such as updating, deleting, or duplicating popups, trees, and themes. The vulnerability has been assigned a CVSS score of 4.3 (Medium), indicating a moderate severity level. The attack vector is network-based, requires no privileges, but does need user interaction for successful exploitation (WPScan).
This vulnerability could allow attackers to force logged-in users to perform unwanted actions through CSRF attacks. The potential impact includes unauthorized modifications to the plugin's settings and operations, which could affect the integrity of the organization chart functionality (Patchstack).
The vulnerability has been patched in version 1.4.5 of the Organization chart plugin. Users are advised to update to version 1.4.5 or later to remediate this security issue (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."