CVE-2023-38395

5.4 MEDIUM

📋 TL;DR

CVE-2023-38395 is a missing authorization vulnerability in the WP Clone Menu WordPress plugin that allows unauthorized users to perform administrative actions. This affects WordPress sites using WP Clone Menu versions up to 1.0.1. Attackers can exploit this to modify site menus without proper authentication.

💻 Affected Systems

Products:
  • WP Clone Menu WordPress Plugin
Versions: n/a through 1.0.1
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized attacker gains administrative control over site navigation, potentially redirecting users to malicious sites or defacing the website.

🟠

Likely Case

Low-privileged users or attackers can modify menu structures, causing site disruption and potential SEO damage.

🟢

If Mitigated

With proper authorization checks, only authenticated administrators can modify menus, limiting impact to authorized changes only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/clone-menu/wordpress-wp-clone-menu-plugin-1-0-1-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Clone Menu and click 'Update Now'. 4. Verify version is 1.0.2 or higher.

🔧 Temporary Workarounds

Disable WP Clone Menu Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate clone-menu

🧯 If You Can't Patch

  • Implement web application firewall rules to block unauthorized menu modification requests
  • Restrict access to WordPress admin interface using IP whitelisting

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP Clone Menu version 1.0.1 or earlier

Check Version:

wp plugin get clone-menu --field=version

Verify Fix Applied:

Verify WP Clone Menu plugin version is 1.0.2 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with action=clone_menu
  • Multiple failed authentication attempts followed by menu modification requests

Network Indicators:

  • Unusual traffic patterns to WordPress admin endpoints from unauthenticated sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters.action="clone_menu") AND NOT user_authenticated=true

🔗 References

📤 Share & Export