CVE-2021-24696

8.8 HIGH

📋 TL;DR

The Simple Download Monitor WordPress plugin before version 3.9.9 lacks proper nonce validation, enabling Cross-Site Request Forgery (CSRF) attacks. Attackers can trick authenticated administrators into performing unauthorized actions like exporting logs (potentially exposing sensitive data), deleting logs, or removing download thumbnails. This affects all WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • Simple Download Monitor WordPress Plugin
Versions: All versions before 3.9.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to trick an authenticated admin user into clicking a malicious link or visiting a compromised page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could combine CSRF with the log disclosure vulnerability (fixed in 3.9.6) to steal sensitive site data, delete audit trails to cover tracks, and disrupt site functionality by removing download thumbnails.

🟠

Likely Case

Attackers trick administrators into deleting download logs or removing thumbnails, causing data loss and site disruption without immediate detection.

🟢

If Mitigated

With proper CSRF protections and updated plugins, no impact occurs as requests would be rejected without valid nonces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to target authenticated admin users, but CSRF attacks are well-understood and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.9

Vendor Advisory: https://wpscan.com/vulnerability/e94772af-39ac-4743-a556-52351ebda9fe

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Simple Download Monitor'. 4. Click 'Update Now' if available, or manually update to version 3.9.9 or later. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Simple Download Monitor plugin until patched.

wp plugin deactivate simple-download-monitor

Implement CSRF Protection

all

Add custom nonce validation to plugin functions if unable to update immediately.

Requires custom PHP code modification - not recommended for non-developers

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only
  • Implement strict Content Security Policy (CSP) headers to limit cross-origin requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Simple Download Monitor > Version. If version is below 3.9.9, system is vulnerable.

Check Version:

wp plugin get simple-download-monitor --field=version

Verify Fix Applied:

Confirm plugin version is 3.9.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected log export/download requests
  • Log deletion events without admin action
  • Thumbnail removal actions from unexpected sources

Network Indicators:

  • POST requests to /wp-admin/admin.php?page=sdm-logs with missing or invalid nonce parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND uri_query="page=sdm-logs") AND http_method="POST" AND NOT nonce=*

🔗 References

📤 Share & Export