4 Apr 2023

Awesome Motive Isn’t Disclosing They Are Trying (and Sometimes Failing) to Fix Vulnerabilities in Their Plugins

Yesterday, Automattic’s WPScan claimed that the latest version of the 1+ million install WordPress plugin WPCode had fixed a vulnerability:

The plugin has a flawed CSRF when deleting log, and does not ensure that the file to be deleted is inside the expected folder. This could allow attackers to make users with the wpcode_activate_snippets capability delete arbitrary log files on the server, including outside of the blog folders [Read more]

27 Feb 2020

Cross-Site Request Forgery (CSRF)/Arbitrary File Deletion Vulnerability in Order / Coupon / Subscription Export Import Plugin for WooCommerce

While looking into something else related to the security of the plugin Order / Coupon / Subscription Export Import Plugin for WooCommerce (Order Export & Order Import for WooCommerce) we found that the latest version introduced a cross-site request forgery (CSRF)/arbitrary file deletion vulnerability.

In the new version these lines of code were added to the file /includes/importer/class-wf-orderimpexpcsv-order-import.php: [Read more]

10 Nov 2016

Cross-Site Request Forgery (CSRF)/File Deletion Vulnerability in XCloner

When it comes to false reports of vulnerabilities in WordPress plugins one popular source of them that is claimed vulnerabilities that can only be exploited by an Administrator level users, which is the highest level user (unless you are using WordPress Multisite). Apparently it isn’t common sense to a lot of people that someone that is Administrator would have wide ranging access, so for them to take almost activity is not a vulnerability. Their access would normally allow them the ability to install other plugins, which in some cases explicitly allows doing what is being claimed to be a vulnerability, and allow them to edit existing plugins, so even if you place security restrictions in the plugin an Administrator would normally be able to remove them. There is an exception to actions taken by an Administrator not being vulnerabilities when it is possible to cause a logged in Administrator to take an action they didn’t intend to, which we will get to a bit later.

This source of false reports came up with a report of an authenticated denial of service (DoS) vulnerability and an authenticated remote code execution (RCE) vulnerability in XCloner released earlier this week. With both claimed the first step in exploiting them was “Authenticate to wordpress with an administrator”, so there isn’t really a vulnerability as claimed, but they could possibly be a bug. [Read more]