
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross-site request forgery (CSRF) vulnerability exists in Activity Log WinterLock WordPress plugin versions prior to 1.2.5. The vulnerability was discovered and reported by KENJI YOSHIKAWA, with public disclosure on February 4, 2025. The affected software is the Activity Log WinterLock plugin developed by SWIT, which is used for WordPress systems (JVN Report, WPScan).
The vulnerability stems from missing or incorrect nonce validation on several functions within the Activity Log WinterLock plugin. The issue has been assigned CVE-2025-24982 and is classified as CWE-352 (Cross-Site Request Forgery). The vulnerability has received a CVSS v3.0 base score of 4.3 (Medium) with the vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N (JVN Report, WPScan).
If successfully exploited, this vulnerability allows attackers to delete log data from the system when a logged-in administrator visits a malicious page. The impact is primarily focused on data integrity, with no direct effect on system confidentiality or availability (JVN Report).
Users are advised to update to Activity Log WinterLock version 1.2.5 or later, which contains security improvements that address this vulnerability. The fix has been released by the developer SWIT (JVN Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."