CVE-2023-45047
📋 TL;DR
This CSRF vulnerability in the LeadSquared Suite WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can deactivate forms without the admin's knowledge or consent. WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- LeadSquared Suite WordPress Plugin
📦 What is this software?
Leadsquared Suite by Leadsquared
⚠️ Risk & Real-World Impact
Worst Case
Attackers could deactivate all forms, disrupting lead generation and business operations, potentially causing significant revenue loss.
Likely Case
Targeted attacks against specific forms to disrupt marketing campaigns or lead collection processes.
If Mitigated
No impact if proper CSRF protections are implemented or plugin is updated.
🎯 Exploit Status
CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick authenticated users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: > 0.7.4
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find LeadSquared Suite plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and remove plugin.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection to form submission endpoints
Use Security Plugins
allInstall WordPress security plugins that provide CSRF protection
🧯 If You Can't Patch
- Deactivate the LeadSquared Suite plugin immediately
- Implement strict access controls and monitor admin sessions for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > LeadSquared Suite version number
Check Version:
wp plugin list --name=leadsquared-suite --field=version
Verify Fix Applied:
Verify plugin version is > 0.7.4 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Multiple form deactivation requests from same admin session
- Admin actions without corresponding login events
Network Indicators:
- POST requests to wp-admin/admin-ajax.php with form deactivation parameters from unexpected referrers
SIEM Query:
source="wordpress.log" AND "action=deactivate_form" AND NOT referer="*wp-admin*"
🔗 References
- https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-request-forgery-csrf-leading-to-form-deactivation-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-request-forgery-csrf-leading-to-form-deactivation-vulnerability?_s_id=cve