CVE-2023-32960

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in UpdraftPlus WordPress Backup Plugin allows attackers to trick authenticated administrators into executing malicious actions. When exploited, it can lead to site-wide XSS attacks affecting all users who visit the compromised WordPress admin area. WordPress sites running vulnerable UpdraftPlus versions are affected.

💻 Affected Systems

Products:
  • UpdraftPlus WordPress Backup Plugin
Versions: <= 1.23.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with UpdraftPlus plugin; vulnerability is present in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full control of WordPress site through admin session hijacking, injects malicious scripts affecting all visitors, and potentially compromises server infrastructure.

🟠

Likely Case

Attacker injects malicious JavaScript into WordPress admin area, stealing admin credentials or redirecting users to malicious sites.

🟢

If Mitigated

Limited impact with proper CSRF protections and admin awareness; potential for minor script injection but contained by security plugins.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated admin to click malicious link; CSRF to XSS chain is well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.23.4

Vendor Advisory: https://updraftplus.com/updraftplus-security-release-1-23-4/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find UpdraftPlus and click 'Update Now'. 4. Verify version shows 1.23.4 or higher.

🔧 Temporary Workarounds

Temporary CSRF Protection

all

Install WordPress security plugin with CSRF protection like Wordfence or iThemes Security

Admin Session Protection

all

Implement strict admin session management and logout idle sessions

🧯 If You Can't Patch

  • Disable UpdraftPlus plugin temporarily and use alternative backup solution
  • Implement web application firewall (WAF) rules to block CSRF attempts targeting UpdraftPlus endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins > UpdraftPlus version

Check Version:

wp plugin list --name=updraftplus --field=version

Verify Fix Applied:

Confirm UpdraftPlus version is 1.23.4 or higher in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with updraftplus actions
  • Multiple failed CSRF token validations in security plugin logs

Network Indicators:

  • HTTP requests with suspicious referer headers targeting UpdraftPlus endpoints
  • Unusual traffic patterns to /wp-admin/admin-ajax.php

SIEM Query:

source="wordpress.logs" AND (uri_path="/wp-admin/admin-ajax.php" AND action="updraftplus_*")

🔗 References

📤 Share & Export