The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to unauthorized ld+json description injection due to a missing capability check on the save_settings function in all versions up to, and including, 3.10.2. This makes it possible for unauthenticated attackers to save schema types.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer <= 3.10.2 - Missing Authorization
Weaknesses CWE-862

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpmudev
Wpmudev smartcrawl
CPEs cpe:2.3:a:wpmudev:smartcrawl:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpmudev
Wpmudev smartcrawl
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:04.127Z

Reserved: 2024-04-03T20:17:41.979Z

Link: CVE-2024-3287

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:08.362Z

cve-icon NVD

Status : Deferred

Published: 2024-05-02T17:15:24.023

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-3287

cve-icon Redhat

No data.