CVE-2023-29426

8.8 HIGH

📋 TL;DR

This Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Spreadshop plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious web pages that, when visited by logged-in administrators, can modify plugin settings or perform other administrative actions without consent. This affects all WordPress sites using Spreadshop plugin version 1.6.5 or earlier.

💻 Affected Systems

Products:
  • WordPress Spreadshop Plugin by Robert Schulz (sprd.Net AG)
Versions: <= 1.6.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Spreadshop plugin installed and activated. Requires administrator authentication for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could completely compromise the WordPress site by changing administrator credentials, installing backdoors, or modifying critical site settings through forged administrative requests.

🟠

Likely Case

Attackers modify plugin settings to redirect users, inject malicious content, or change shop configurations to benefit the attacker financially.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is limited to users who click malicious links while authenticated as administrators.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement. Exploitation requires the victim to be logged in as an administrator and visit a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/spreadshop/wordpress-spreadshop-plugin-plugin-1-6-5-cross-site-request-forgery-csrf-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Spreadshop plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to all administrative forms in the plugin

Requires custom PHP development to add nonce verification to plugin forms

Disable Plugin

linux

Temporarily disable the Spreadshop plugin until patched

wp plugin deactivate spreadshop

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Spreadshop version. If version is 1.6.5 or earlier, you are vulnerable.

Check Version:

wp plugin get spreadshop --field=version

Verify Fix Applied:

After updating, verify version shows 1.6.6 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to spreadshop admin endpoints without referrer headers
  • Unusual plugin setting changes in WordPress logs

Network Indicators:

  • HTTP requests to spreadshop admin endpoints originating from external domains

SIEM Query:

source="wordpress.log" AND "spreadshop" AND ("POST" OR "admin-ajax.php") AND NOT referer="*your-domain*"

🔗 References

📤 Share & Export