CVE-2020-35950

9.8 CRITICAL

📋 TL;DR

This vulnerability in the XCloner Backup and Restore WordPress plugin allows Cross-Site Request Forgery (CSRF) attacks via almost any endpoint. Attackers can trick authenticated administrators into performing unintended actions like modifying settings, deleting backups, or potentially compromising the WordPress site. All WordPress sites using vulnerable versions of the XCloner plugin are affected.

💻 Affected Systems

Products:
  • XCloner Backup and Restore WordPress Plugin
Versions: All versions before 4.2.153
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the XCloner plugin to be installed and activated on a WordPress site. The vulnerability affects all endpoints of the plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through CSRF attacks that trick administrators into executing malicious actions, potentially leading to data loss, backup deletion, or installation of backdoors.

🟠

Likely Case

Unauthorized configuration changes, backup deletion, or data manipulation by tricking authenticated users into clicking malicious links.

🟢

If Mitigated

Limited impact with proper CSRF protections, user awareness training, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks require tricking authenticated users but are relatively simple to execute. Public exploit details are available through security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.153 and later

Vendor Advisory: https://wordpress.org/plugins/xcloner-backup-and-restore/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find XCloner Backup and Restore. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.2.153+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable XCloner Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate xcloner-backup-and-restore

Implement CSRF Protection Headers

linux

Add security headers to WordPress to help mitigate CSRF attacks

Add to .htaccess: Header set X-Frame-Options DENY
Add to .htaccess: Header set Content-Security-Policy "frame-ancestors 'none'"

🧯 If You Can't Patch

  • Implement strict access controls and limit administrative access to trusted networks only
  • Deploy web application firewall (WAF) rules to detect and block CSRF attack patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → XCloner Backup and Restore → Version. If version is below 4.2.153, the site is vulnerable.

Check Version:

wp plugin get xcloner-backup-and-restore --field=version

Verify Fix Applied:

Confirm XCloner plugin version is 4.2.153 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to XCloner endpoints without proper referrer headers
  • Multiple failed CSRF token validations in WordPress logs
  • Unexpected configuration changes to XCloner settings

Network Indicators:

  • HTTP requests to /wp-admin/admin.php?page=xcloner_ with suspicious referrers
  • CSRF attack patterns in web server logs

SIEM Query:

source="wordpress.log" AND ("xcloner" OR "admin-ajax.php") AND ("csrf" OR "referer" NOT CONTAINS "your-domain.com")

🔗 References

📤 Share & Export