CVE-2020-36707

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Coming Soon & Maintenance Mode Page WordPress plugin allows attackers to trick administrators into performing unauthorized actions by clicking malicious links. Attackers could change site settings, disable security features, or potentially gain further access. All WordPress sites using this plugin version 1.57 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Coming Soon & Maintenance Mode Page plugin
Versions: Up to and including version 1.57
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could completely compromise the WordPress site by changing administrator credentials, installing backdoors, or disabling security plugins, leading to full site takeover.

🟠

Likely Case

Attackers would modify plugin settings to disable maintenance mode prematurely, change coming soon page content, or alter site configuration without authorization.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is limited to unsuccessful exploitation attempts that administrators would notice and report.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators into clicking malicious links, but the technical execution is simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.58 or later

Vendor Advisory: https://wordpress.org/plugins/coming-soon-maintenance-mode-page/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Coming Soon & Maintenance Mode Page'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate coming-soon-maintenance-mode-page

Implement CSRF protection middleware

all

Add custom nonce validation to WordPress admin functions

Add wp_verify_nonce() checks in plugin admin functions

🧯 If You Can't Patch

  • Implement strict access controls and limit admin panel access to trusted networks only
  • Educate administrators about phishing risks and implement mandatory security awareness training

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Coming Soon & Maintenance Mode Page → Version number. If version is 1.57 or lower, you are vulnerable.

Check Version:

wp plugin get coming-soon-maintenance-mode-page --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.58 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected plugin setting changes without admin login
  • Multiple failed nonce validation attempts in WordPress debug logs

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-post.php with suspicious referer headers
  • Requests containing plugin-specific parameters from unexpected sources

SIEM Query:

source="wordpress.log" AND ("coming-soon" OR "maintenance-mode") AND ("nonce_failure" OR "csrf")

🔗 References

📤 Share & Export