CVE-2021-4373

8.8 HIGH

📋 TL;DR

The Better Search WordPress plugin up to version 2.5.2 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows unauthenticated attackers to trick administrators into importing malicious settings. This affects WordPress sites using vulnerable versions of the plugin. Attackers can exploit this by getting an administrator to click a specially crafted link.

💻 Affected Systems

Products:
  • Better Search WordPress Plugin
Versions: Versions up to and including 2.5.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Better Search plugin installed and activated. Requires administrator interaction for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could import malicious settings that compromise site functionality, redirect users, inject malicious content, or enable further attacks through the plugin's configuration.

🟠

Likely Case

Attackers trick administrators into importing unwanted settings that could modify search behavior, inject advertisements, or redirect users to malicious sites.

🟢

If Mitigated

With proper CSRF protections and administrator awareness, exploitation would be prevented even if the vulnerability exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators into clicking malicious links. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.5.3 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2473344

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Better Search plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.5.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Better Search Plugin

all

Temporarily deactivate the plugin until patched

Implement CSRF Protection

all

Add WordPress nonce verification to plugin files

🧯 If You Can't Patch

  • Remove the Better Search plugin entirely if not essential
  • Implement strict access controls and educate administrators about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Better Search → Version number. If version is 2.5.2 or lower, you are vulnerable.

Check Version:

wp plugin list --name='better-search' --field=version

Verify Fix Applied:

After updating, verify Better Search plugin version is 2.5.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual settings import activity in WordPress logs
  • Administrator actions from unexpected IP addresses or user agents

Network Indicators:

  • HTTP POST requests to /wp-admin/admin.php?page=better-search with import parameters from unexpected sources

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND uri_query="page=better-search" AND method="POST")

🔗 References

📤 Share & Export