CVE-2022-0215
📋 TL;DR
This CSRF vulnerability in XootiX WordPress plugins allows attackers to trick authenticated administrators into unknowingly executing malicious actions, including creating new admin accounts and taking full control of affected WordPress sites. It affects three popular WooCommerce plugins used by approximately 84,000 WordPress sites. Attackers can exploit this by getting an admin to click a malicious link while logged in.
💻 Affected Systems
- Login/Signup Popup WordPress plugin
- Waitlist Woocommerce (Back in stock notifier)
- Side Cart Woocommerce (Ajax)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover with attacker creating administrative accounts, installing backdoors, stealing sensitive data, and defacing or destroying the website.
Likely Case
Attacker creates hidden admin account, maintains persistent access, and uses the compromised site for phishing, malware distribution, or further attacks.
If Mitigated
With proper CSRF protections and admin awareness, exploitation attempts fail or are detected before damage occurs.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated admin users, but the technical complexity is minimal with public proof-of-concept available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Login/Signup Popup 2.3+, Waitlist Woocommerce 2.5.2+, Side Cart Woocommerce 2.1+
Vendor Advisory: https://wordpress.org/plugins/easy-login-woocommerce/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Update all affected XootiX plugins to latest versions. 4. Verify updates completed successfully.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
linuxDisable vulnerable plugins until patches can be applied
wp plugin deactivate easy-login-woocommerce
wp plugin deactivate side-cart-woocommerce
wp plugin deactivate waitlist-woocommerce
🧯 If You Can't Patch
- Implement CSRF protection at web application firewall level
- Restrict admin panel access to specific IP addresses only
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for XootiX plugin versions
Check Version:
wp plugin list --name='easy-login-woocommerce|side-cart-woocommerce|waitlist-woocommerce' --field=version
Verify Fix Applied:
Verify plugin versions show Login/Signup Popup >= 2.3, Waitlist Woocommerce >= 2.5.2, Side Cart Woocommerce >= 2.1
📡 Detection & Monitoring
Log Indicators:
- Unexpected admin user creation
- Plugin settings changes from unusual IPs
- Multiple failed login attempts followed by successful admin creation
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=xoo_admin_settings_save from unexpected sources
SIEM Query:
source="wordpress.log" AND ("action=xoo_admin_settings_save" OR "user_role=administrator" AND "user_registered")
🔗 References
- https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122
- https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128
- https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122
- https://wordfence.com/vulnerability-advisories/#CVE-2022-0215
- https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/
- https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122
- https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128
- https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122
- https://wordfence.com/vulnerability-advisories/#CVE-2022-0215
- https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/