CVE-2024-8477

📊 4.3 MEDIUM0.0%🎯 0 exploits
📅 Published Oct 10, 2024
📋 Status: Analyzed

The Newsletter, SMTP, Email marketing and Subscribe forms by Brevo (formely Sendinblue) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.87. This is due to missing or incorrect nonce validation on the Init() function. This makes it possible for unauthenticated attackers to log out of a Brevo connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
Version: < 3.1.88
Target SW: wordpress
CPE:
cpe:2.3:a:brevo:newsletter\,_smtp\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*
Metrics
4.3 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
REQUIRED
Confidentiality:
NONE
Integrity:
LOW
Availability:
NONE
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
4.3 (MEDIUM)v3.1
EPSS Details
0.0% (Minimal)12.2th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Oct 10, 2024 (1 year ago)
Last Modified
Oct 15, 2024 (1 year ago)
Security Weaknesses2
References3