Unprotected CSRF Vulnerability in Sticky Buttons WordPress Plugin Could Allow Admin Account Takeover
CVE-2024-3475

7.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
2 May 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The Sticky Buttons plugin for WordPress, prior to version 3.2.4, is susceptible to Cross-Site Request Forgery (CSRF) attacks due to a lack of verification in several bulk actions. This vulnerability enables unauthorized users to exploit the absence of CSRF checks, potentially leading logged-in administrators to execute unintended actions, such as the deletion of buttons, without their consent. Proper measures should be implemented to mitigate these risks.

Affected Version(s)

Sticky Buttons 0 < 3.2.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.