CVE-2023-35877
📋 TL;DR
This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Extra User Details plugin that allows attackers to perform stored cross-site scripting (XSS) attacks. Attackers can trick authenticated administrators into executing malicious actions, potentially compromising user data and site security. All WordPress sites using Extra User Details plugin versions up to 0.5 are affected.
💻 Affected Systems
- WordPress Extra User Details plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could gain administrative access, deface websites, steal sensitive user data, or install backdoors for persistent access.
Likely Case
Attackers inject malicious scripts that steal session cookies or redirect users to phishing sites when administrators visit compromised pages.
If Mitigated
With proper CSRF tokens and input validation, the attack surface is minimized, though outdated plugins still pose some risk.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated users, but the technical complexity is low once the user is tricked.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 0.6 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Extra User Details' and click 'Update Now' if available. 4. If no update is available, deactivate and delete the plugin, then install version 0.6+ from WordPress repository.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Extra User Details plugin to eliminate the vulnerability.
wp plugin deactivate extra-user-details
Implement CSRF Protection
allAdd custom CSRF tokens to plugin forms if you cannot update immediately.
Add nonce fields to plugin forms: wp_nonce_field('extra_user_details_action');
🧯 If You Can't Patch
- Restrict plugin access to trusted administrators only and monitor their activities.
- Implement web application firewall (WAF) rules to block suspicious POST requests to plugin endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Extra User Details for version number. If version is 0.5 or earlier, you are vulnerable.
Check Version:
wp plugin get extra-user-details --field=version
Verify Fix Applied:
After update, verify plugin version is 0.6 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with extra-user-details parameters
- Multiple failed CSRF token validations in WordPress debug logs
Network Indicators:
- Unexpected outbound connections from WordPress site to unknown domains following admin actions
SIEM Query:
source="wordpress.log" AND ("extra-user-details" OR "admin-ajax.php") AND (POST AND NOT "_wpnonce")
🔗 References
- https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve