CVE-2020-35135
📋 TL;DR
CVE-2020-35135 is a Cross-Site Request Forgery (CSRF) vulnerability in the Ultimate Category Excluder WordPress plugin. It allows attackers to trick authenticated administrators into performing unintended actions, potentially modifying plugin settings. This affects WordPress sites using vulnerable versions of the plugin.
💻 Affected Systems
- WordPress Ultimate Category Excluder plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker could change plugin settings to exclude critical categories from display, disrupting website functionality and potentially causing denial of service for affected content.
Likely Case
Attackers modify category exclusion settings, causing content display issues that require administrative intervention to fix.
If Mitigated
With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal plugin functionality.
🎯 Exploit Status
CSRF attacks are well-understood and easy to implement. Exploitation requires social engineering to trick authenticated users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2434070
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ultimate Category Excluder. 4. Click 'Update Now' if available, or manually update to version 1.2+. 5. Verify plugin is active and functioning.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate ultimate-category-excluder
CSRF Protection Implementation
allAdd CSRF tokens to plugin forms via custom code
🧯 If You Can't Patch
- Remove the Ultimate Category Excluder plugin entirely and use alternative category management solutions.
- Implement web application firewall rules to block CSRF attempts targeting the plugin endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Ultimate Category Excluder → View version. If version is below 1.2, system is vulnerable.
Check Version:
wp plugin get ultimate-category-excluder --field=version
Verify Fix Applied:
Confirm plugin version is 1.2 or higher in WordPress admin panel and test category exclusion functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin.php?page=ultimate-category-excluder
- Multiple failed CSRF token validations in WordPress logs
Network Indicators:
- HTTP requests to plugin admin endpoints without proper referrer headers or CSRF tokens
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query_string="page=ultimate-category-excluder")
🔗 References
- https://advisory.checkmarx.net/advisory/CX-2020-4294
- https://plugins.trac.wordpress.org/changeset/2434070
- https://wordpress.org/plugins/ultimate-category-excluder/#developers
- https://advisory.checkmarx.net/advisory/CX-2020-4294
- https://plugins.trac.wordpress.org/changeset/2434070
- https://wordpress.org/plugins/ultimate-category-excluder/#developers