The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to unauthorized ld+json description injection due to a missing capability check on the save_settings function in all versions up to, and including, 3.10.2. This makes it possible for unauthenticated attackers to save schema types.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31877 | The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to unauthorized ld+json description injection due to a missing capability check on the save_settings function in all versions up to, and including, 3.10.2. This makes it possible for unauthenticated attackers to save schema types. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpmudev
Wpmudev smartcrawl |
|
| CPEs | cpe:2.3:a:wpmudev:smartcrawl:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpmudev
Wpmudev smartcrawl |
|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-12T20:44:09.446Z
Reserved: 2024-04-03T20:17:41.979Z
Link: CVE-2024-3287
Updated: 2024-08-01T20:05:08.362Z
Status : Awaiting Analysis
Published: 2024-05-02T17:15:24.023
Modified: 2024-11-21T09:29:19.453
Link: CVE-2024-3287
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD