CVE-2020-35135

8.8 HIGH

📋 TL;DR

CVE-2020-35135 is a Cross-Site Request Forgery (CSRF) vulnerability in the Ultimate Category Excluder WordPress plugin. It allows attackers to trick authenticated administrators into performing unintended actions, potentially modifying plugin settings. This affects WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • WordPress Ultimate Category Excluder plugin
Versions: All versions before 1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Attack requires tricking an authenticated administrator.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could change plugin settings to exclude critical categories from display, disrupting website functionality and potentially causing denial of service for affected content.

🟠

Likely Case

Attackers modify category exclusion settings, causing content display issues that require administrative intervention to fix.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail, maintaining normal plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement. Exploitation requires social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2434070

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ultimate Category Excluder. 4. Click 'Update Now' if available, or manually update to version 1.2+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate ultimate-category-excluder

CSRF Protection Implementation

all

Add CSRF tokens to plugin forms via custom code

🧯 If You Can't Patch

  • Remove the Ultimate Category Excluder plugin entirely and use alternative category management solutions.
  • Implement web application firewall rules to block CSRF attempts targeting the plugin endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Ultimate Category Excluder → View version. If version is below 1.2, system is vulnerable.

Check Version:

wp plugin get ultimate-category-excluder --field=version

Verify Fix Applied:

Confirm plugin version is 1.2 or higher in WordPress admin panel and test category exclusion functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=ultimate-category-excluder
  • Multiple failed CSRF token validations in WordPress logs

Network Indicators:

  • HTTP requests to plugin admin endpoints without proper referrer headers or CSRF tokens

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query_string="page=ultimate-category-excluder")

🔗 References

📤 Share & Export