CVE-2023-33333

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to site-wide Cross-Site Scripting (XSS) in the Complianz WordPress plugins. Attackers can trick authenticated administrators into executing malicious actions, potentially injecting malicious scripts across the entire website. All WordPress sites using vulnerable versions of Complianz or Complianz Premium plugins are affected.

💻 Affected Systems

Products:
  • Complianz
  • Complianz Premium
Versions: Complianz: n/a through 6.4.4; Complianz Premium: n/a through 6.4.6.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin versions. The vulnerability affects both free and premium versions of the plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through persistent XSS payloads that affect all visitors, leading to credential theft, malware distribution, or defacement.

🟠

Likely Case

Attackers inject malicious JavaScript that steals session cookies or redirects users to phishing sites, compromising user accounts and data.

🟢

If Mitigated

Limited impact with proper CSRF protections and content security policies in place, though some administrative functions may still be vulnerable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised page. The CSRF-to-XSS chain makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Complianz: 6.4.5+, Complianz Premium: 6.4.6.2+

Vendor Advisory: https://patchstack.com/database/vulnerability/complianz-gdpr-premium/wordpress-complianz-premium-plugin-6-4-6-1-csrf-to-site-wide-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Complianz or Complianz Premium. 4. Click 'Update Now' if available. 5. If auto-update fails, download latest version from WordPress repository or vendor site and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patching is possible

wp plugin deactivate complianz-gdpr
wp plugin deactivate complianz-gdpr-premium

CSRF Protection Headers

all

Implement Content Security Policy (CSP) headers to mitigate XSS impact

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:";

🧯 If You Can't Patch

  • Restrict administrative access to trusted networks only using firewall rules or VPN
  • Implement additional authentication factors for WordPress admin users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Complianz version numbers

Check Version:

wp plugin list --name=complianz --field=version

Verify Fix Applied:

Verify plugin version is Complianz 6.4.5+ or Complianz Premium 6.4.6.2+ in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with Complianz-related actions
  • Multiple failed CSRF token validations in WordPress debug logs

Network Indicators:

  • Suspicious referrer headers in admin requests
  • Unexpected JavaScript injection in plugin settings pages

SIEM Query:

source="wordpress.log" AND ("complianz" OR "gdpr") AND ("admin-ajax" OR "csrf")

🔗 References

📤 Share & Export