CVE-2023-45047

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the LeadSquared Suite WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can deactivate forms without the admin's knowledge or consent. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • LeadSquared Suite WordPress Plugin
Versions: <= 0.7.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to trick authenticated admin into visiting malicious page while logged in.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could deactivate all forms, disrupting lead generation and business operations, potentially causing significant revenue loss.

🟠

Likely Case

Targeted attacks against specific forms to disrupt marketing campaigns or lead collection processes.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or plugin is updated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 0.7.4

Vendor Advisory: https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-request-forgery-csrf-leading-to-form-deactivation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find LeadSquared Suite plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and remove plugin.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection to form submission endpoints

Use Security Plugins

all

Install WordPress security plugins that provide CSRF protection

🧯 If You Can't Patch

  • Deactivate the LeadSquared Suite plugin immediately
  • Implement strict access controls and monitor admin sessions for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > LeadSquared Suite version number

Check Version:

wp plugin list --name=leadsquared-suite --field=version

Verify Fix Applied:

Verify plugin version is > 0.7.4 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple form deactivation requests from same admin session
  • Admin actions without corresponding login events

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with form deactivation parameters from unexpected referrers

SIEM Query:

source="wordpress.log" AND "action=deactivate_form" AND NOT referer="*wp-admin*"

🔗 References

📤 Share & Export