CVE-2022-3899
📋 TL;DR
This CSRF vulnerability in the 3dprint WordPress plugin allows attackers to delete arbitrary files and directories on the server by tricking an authenticated admin into submitting a malicious form. The vulnerability exists in the modified Tiny File Manager component included with the plugin. WordPress sites using vulnerable versions of the 3dprint plugin are affected.
💻 Affected Systems
- 3dprint WordPress plugin
📦 What is this software?
3dprint by 3dprint Project
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through deletion of critical system files, leading to website defacement, data loss, or service disruption.
Likely Case
Selective deletion of website files causing broken functionality, content loss, or partial site compromise.
If Mitigated
No impact if CSRF protections are properly implemented or the vulnerable component is disabled.
🎯 Exploit Status
Exploitation requires social engineering to trick an authenticated admin into clicking a malicious link or visiting a crafted page.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.6.9
Vendor Advisory: https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find '3dprint' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.5.6.9+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable the plugin
allTemporarily deactivate the 3dprint plugin until patched.
wp plugin deactivate 3dprint
Implement CSRF protection
allAdd CSRF tokens to forms or use WordPress nonce system for the affected file manager component.
🧯 If You Can't Patch
- Restrict admin access to trusted networks only
- Implement web application firewall rules to block suspicious file deletion requests
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for 3dprint plugin version.
Check Version:
wp plugin get 3dprint --field=version
Verify Fix Applied:
Confirm plugin version is 3.5.6.9 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual file deletion patterns in web server logs
- POST requests to 3dprint plugin file manager endpoints without referrer headers
Network Indicators:
- HTTP requests containing file deletion parameters targeting the 3dprint plugin
SIEM Query:
source="web_logs" AND uri="*3dprint*" AND (method="POST" OR params="*delete*")