Exploit
CVE-2024-7862

Cross-Site Request Forgery (CSRF) (CWE-352)

Published: Sep 12, 2024 / Updated: 2mo ago

010
CVSS 6.5EPSS 0.04%Medium
CVE info copied to clipboard

Summary

The blogintroduction-wordpress-plugin WordPress plugin through version 0.3.0 lacks Cross-Site Request Forgery (CSRF) protection when updating its settings. This vulnerability could allow attackers to manipulate plugin settings through a CSRF attack, potentially compromising the integrity of the WordPress site.

Impact

This vulnerability has a high integrity impact. Attackers could exploit this flaw to change plugin settings without the admin's knowledge or consent. This could lead to various adverse effects, including: 1. Unauthorized changes to blog introductions or other plugin-controlled content. 2. Potential insertion of malicious content or scripts into the WordPress site. 3. Modification of plugin functionality that could affect site behavior or security. 4. Possible escalation to more severe attacks if combined with other vulnerabilities. The attack requires user interaction, likely in the form of tricking an authenticated admin into clicking a malicious link or visiting a compromised website while logged in to their WordPress dashboard.

Exploitation

One proof-of-concept exploit is available on wpscan.com. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, there is no mention of a patch being available. The vulnerability affects the plugin through version 0.3.0, which suggests that users should look for updates beyond this version or consider alternative plugins if an update is not available.

Mitigation

To mitigate this vulnerability, consider the following recommendations: 1. Update the blogintroduction-wordpress-plugin to a version newer than 0.3.0 if available. 2. If no update is available, consider disabling or removing the plugin until a fix is released. 3. Implement additional security measures such as Web Application Firewalls (WAF) that can help detect and prevent CSRF attacks. 4. Educate WordPress admins about the risks of CSRF attacks and the importance of not clicking on unknown links while logged into the WordPress dashboard. 5. Regularly monitor plugin settings for any unauthorized changes. 6. Consider implementing additional authentication steps for critical admin actions. 7. Keep the WordPress core, all themes, and other plugins up to date to maintain overall site security.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-7862. See article

Aug 29, 2024 at 1:48 PM / Wordfence
CVE Assignment

NVD published the first details for CVE-2024-7862

Sep 12, 2024 at 6:15 AM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 12, 2024 at 6:21 AM
CVSS

A CVSS base score of 4.3 has been assigned.

Sep 12, 2024 at 2:41 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 13, 2024 at 11:56 AM
CVSS

A CVSS base score of 6.5 has been assigned.

Sep 30, 2024 at 2:20 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 30, 2024 at 5:10 PM
Static CVE Timeline Graph

Affected Systems

Kimhuebel/blogintroduction-wordpress-plugin
+null more

Exploits

https://wpscan.com/vulnerability/9b54cd05-3bb8-4bb9-a0e4-fb00d97d5cae/
+null more

Attack Patterns

CAPEC-111: JSON Hijacking (aka JavaScript Hijacking)
+null more

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI