CVE-2022-27432

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Pluck CMS v4.7.15 allows attackers to trick authenticated users into unknowingly changing their passwords via malicious requests. Attackers can take over any user account by exploiting this flaw. All users of the affected Pluck CMS version are vulnerable to account compromise.

💻 Affected Systems

Products:
  • Pluck CMS
Versions: v4.7.15
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with user accounts and password change functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, deface websites, steal sensitive data, or deploy malware.

🟠

Likely Case

Account takeover of regular users leading to unauthorized content modification, data theft, or privilege escalation.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if the vulnerability is patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and visit a malicious page while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.7.16 or later

Vendor Advisory: https://github.com/pluck-cms/pluck/releases

Restart Required: No

Instructions:

1. Backup your Pluck CMS installation. 2. Download the latest version from the official repository. 3. Replace the affected files with patched versions. 4. Verify the update by checking the version in the admin panel.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to password change forms and validate them server-side.

Disable Password Change Feature

all

Temporarily disable the password change functionality until patched.

🧯 If You Can't Patch

  • Implement web application firewall rules to block CSRF attempts
  • Require re-authentication for password changes

🔍 How to Verify

Check if Vulnerable:

Check if your Pluck CMS version is 4.7.15 by viewing the admin panel or checking version files.

Check Version:

Check the admin panel dashboard or inspect the pluck/version.php file.

Verify Fix Applied:

Verify the version is 4.7.16 or later and test password change functionality with CSRF protection.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password change requests from same IP with different user agents
  • Password changes without corresponding login events

Network Indicators:

  • HTTP POST requests to password change endpoints without proper referrer headers

SIEM Query:

source="web_logs" AND (uri_path="/admin.php?action=changepass" OR uri_path LIKE "%/changepass%") AND status=200

🔗 References

📤 Share & Export