Favicon by RealFaviconGenerator Vulnerability – Cross-Site Request Forgery to Notice Dismissal – CVE-2024-31422 | WordPress Plugin Vulnerability Report

Plugin Name: Favicon by RealFaviconGenerator

Key Information:

  • Software Type: Plugin
  • Software Slug: favicon-by-realfavicongenerator
  • Software Status: Active
  • Software Author: phbernard
  • Software Downloads: 3,235,128
  • Active Installs: 300,000
  • Last Updated: April 24, 2024
  • Patched Versions: 1.3.30
  • Affected Versions: <= 1.3.29

Vulnerability Details:

  • Name: Favicon <= 1.3.29
  • Title: Cross-Site Request Forgery to Notice Dismissal
  • Type: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
  • CVE: CVE-2024-31422
  • CVSS Score: 4.3
  • Publicly Published: April 10, 2024
  • Researcher: Vladislav Pokrovsky (ΞX.MI) - Independent AppSec Researcher
  • Description: The Favicon plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.29. This vulnerability arises from missing or incorrect nonce validation on the process_ignored_notice() function, allowing unauthenticated attackers to dismiss notices via a forged request if they can trick a site administrator into clicking a link.


The Favicon plugin for WordPress has a vulnerability in versions up to and including 1.3.29 that enables Cross-Site Request Forgery due to inadequate nonce validation in the process_ignored_notice() function. This vulnerability has been patched in version 1.3.30.

Detailed Overview:

This vulnerability in the Favicon plugin represents a significant security risk, stemming from the improper handling of nonce validation within the process_ignored_notice() function. Nonce (number used once) validation is a key security feature designed to protect against CSRF attacks, which exploit the trust that a web application has in the user's browser. By not correctly validating nonces, the plugin allowed attackers to potentially manipulate administrative notices, which could be leveraged to perform other malicious activities unnoticed. The patch in version 1.3.30 addresses this nonce validation issue, closing the vulnerability window.

Advice for Users:

  • Immediate Action: Update to the patched version, 1.3.30, immediately to close the security vulnerability.
  • Check for Signs of Vulnerability: Administrators should inspect their site’s activity logs for any unauthorized notice dismissals or other suspicious activities that might indicate this vulnerability was exploited.
  • Alternate Plugins: While the current issue has been addressed, users may consider using other favicon management plugins that consistently maintain robust security protocols as an additional safeguard.
  • Stay Updated: Regularly updating all software components on your WordPress site is crucial for maintaining security and functionality, protecting against known vulnerabilities.


The swift action taken by the developers of Favicon by RealFaviconGenerator to patch the identified CSRF vulnerability underscores the critical importance of maintaining up-to-date software on your WordPress site. This proactive approach is vital for securing websites against potential threats, ensuring that both site functionality and user data remain protected. Users are encouraged to verify that they are running the latest version of the plugin, thus ensuring their site's security against this and potentially other vulnerabilities.


Detailed Report: 

In the ever-evolving digital landscape, maintaining the security of your website is not just a recommendation—it's a necessity. This imperative is highlighted by the recent discovery of a significant vulnerability in the "Favicon by RealFaviconGenerator" plugin, a tool utilized by over 300,000 websites to manage favicon display. The plugin was found to be susceptible to a Cross-Site Request Forgery (CSRF) attack, a type of vulnerability that can allow attackers to manipulate website settings without the knowledge of site administrators.

About the Plugin: Favicon by RealFaviconGenerator

"Favicon by RealFaviconGenerator" is a WordPress plugin designed to facilitate the easy management and implementation of favicons on WordPress sites. Developed by phbernard, the plugin boasts over 3.2 million downloads and is actively installed on 300,000 sites. It allows users to create and implement favicons that work on all browsers and platforms, enhancing brand presence across the web.

Vulnerability Details

The vulnerability, identified as CVE-2024-31422, affects versions of the plugin up to and including 1.3.29. It stems from insufficient nonce validation within the process_ignored_notice() function, which could allow unauthenticated attackers to perform unauthorized actions, such as dismissing administrative notices. This vulnerability, with a CVSS score of 4.3, was publicly published on April 10, 2024, by independent AppSec researcher Vladislav Pokrovsky.

Risks and Potential Impacts

The CSRF vulnerability poses a significant threat as it can be exploited simply through social engineering tactics, such as tricking an administrator into clicking a malicious link. The potential dismissal of critical administrative notices can lead to overlooked updates or warnings that could prevent further vulnerabilities. This type of oversight can compromise not only the security of the website but also the data integrity and trustworthiness of the site from a user's perspective.

Remediation Steps

In response to the discovery of the CSRF vulnerability, developers of the plugin promptly released a patched version, 1.3.30, which addresses the nonce validation flaw. Website administrators are urged to update to this latest version immediately to mitigate the vulnerability. It is also recommended that administrators review their site’s activity logs for any signs of unusual activities that could suggest exploitation of this vulnerability.

Overview of Previous Vulnerabilities

Since its inception, the Favicon by RealFaviconGenerator plugin has encountered three previous vulnerabilities since April 1, 2015. Each of these vulnerabilities has been addressed in subsequent updates, showcasing the developer's commitment to security and continuous improvement.


The rapid resolution of the CVE-2024-31422 vulnerability by the Favicon by RealFaviconGenerator team underscores the critical importance of regular software updates in safeguarding digital assets. For small business owners who manage their WordPress websites, this incident highlights the necessity of staying vigilant and proactive in updating plugins and other site components. Ensuring that all software components are up-to-date is not merely a technical task—it is an essential business practice that protects your site, enhances your operational integrity, and secures the trust of your users.

This comprehensive structure provides a detailed look at the vulnerability, its implications, and the necessary steps for remediation, aimed at helping small business owners understand and manage the risks associated with running WordPress sites.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Favicon by RealFaviconGenerator Vulnerability – Cross-Site Request Forgery to Notice Dismissal – CVE-2024-31422 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment