CVE-2020-18195
📋 TL;DR
This CSRF vulnerability in Pluck CMS v4.7.9 allows attackers to trick authenticated administrators into performing unauthorized actions, specifically deleting articles via the admin interface. Any Pluck CMS installation running the vulnerable version with admin access is affected.
💻 Affected Systems
- Pluck CMS
📦 What is this software?
Pluck by Pluck Cms
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete all website content, deface the site, or chain with other vulnerabilities to achieve remote code execution.
Likely Case
Targeted deletion of specific articles or pages, potentially causing content loss and website disruption.
If Mitigated
With proper CSRF protections, the attack would fail as the forged requests would be rejected.
🎯 Exploit Status
Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v4.7.10 or later
Vendor Advisory: https://github.com/pluck-cms/pluck/issues/69
Restart Required: No
Instructions:
1. Backup your Pluck CMS installation. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with the patched version. 4. Verify the admin interface includes CSRF tokens.
🔧 Temporary Workarounds
Implement CSRF Protection Manually
allAdd CSRF tokens to admin forms and validate them on submission.
Restrict Admin Access
linuxLimit admin panel access to specific IP addresses using .htaccess or web server configuration.
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
🧯 If You Can't Patch
- Implement strict SameSite cookie policies and use anti-CSRF middleware.
- Educate administrators to log out of the admin panel when not in use and avoid clicking suspicious links.
🔍 How to Verify
Check if Vulnerable:
Check if your Pluck CMS version is 4.7.9 by viewing the version file or admin panel.
Check Version:
cat /path/to/pluck/data/settings/version.dat
Verify Fix Applied:
After updating, confirm the version is 4.7.10+ and test that admin forms include CSRF tokens.
📡 Detection & Monitoring
Log Indicators:
- Multiple DELETE requests to /admin.php?action=page from unusual IPs or user agents
- Admin actions without corresponding login events
Network Indicators:
- Unexpected POST/DELETE requests to admin endpoints with referer headers pointing to external domains
SIEM Query:
source="web_logs" AND uri="/admin.php" AND action="page" AND method="DELETE"