CVE-2015-4697
📋 TL;DR
This CSRF vulnerability in Google Analyticator WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can force administrators to change plugin settings without their knowledge. This affects all WordPress sites running vulnerable versions of the Google Analyticator plugin.
💻 Affected Systems
- Google Analyticator WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify Google Analytics tracking settings, potentially redirecting analytics data to attacker-controlled accounts or disabling tracking entirely, compromising business intelligence.
Likely Case
Attackers modify plugin configuration to inject malicious tracking code or disable legitimate analytics, potentially affecting site functionality and data collection.
If Mitigated
With proper CSRF protections and user awareness, administrators would not execute malicious requests, preventing exploitation.
🎯 Exploit Status
Exploitation requires tricking authenticated administrator into clicking malicious link or visiting compromised page. CSRF attacks are well-understood and easy to implement.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.9.3 rev @1183563
Vendor Advisory: https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Google Analyticator. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.4.9.3+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Add CSRF Protection Manually
allAdd nonce verification to plugin forms to prevent CSRF attacks
Requires modifying plugin PHP files to add wp_nonce_field() and wp_verify_nonce() calls
Disable Plugin
allTemporarily disable Google Analyticator plugin until patched
wp plugin deactivate google-analyticator
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block CSRF attempts
- Educate administrators about CSRF risks and safe browsing practices
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins → Installed Plugins. Look for Google Analyticator version number.
Check Version:
wp plugin get google-analyticator --field=version
Verify Fix Applied:
Verify plugin version is 6.4.9.3 or higher. Check that nonce verification exists in plugin form handling code.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /wp-admin/admin.php?page=google-analyticator from same IP with different user agents
- Unauthorized changes to plugin settings in WordPress logs
Network Indicators:
- HTTP POST requests to plugin admin endpoints without proper referrer headers or nonce tokens
SIEM Query:
source="wordpress.log" AND ("google-analyticator" OR "admin.php?page=google-analyticator") AND method="POST"
🔗 References
- http://seclists.org/fulldisclosure/2015/Jun/57
- http://www.openwall.com/lists/oss-security/2015/06/21/5
- http://www.securityfocus.com/bid/75325
- https://plugins.trac.wordpress.org/changeset/1183563
- https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/
- http://seclists.org/fulldisclosure/2015/Jun/57
- http://www.openwall.com/lists/oss-security/2015/06/21/5
- http://www.securityfocus.com/bid/75325
- https://plugins.trac.wordpress.org/changeset/1183563
- https://wordpress.org/support/topic/discovered-security-vulnerabilities-1/