CVE-2023-46778

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Auto Limit Posts Reloaded WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. Attackers can create malicious requests that modify plugin settings when an admin visits a compromised page. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • TheFreeWindows Auto Limit Posts Reloaded WordPress plugin
Versions: <= 2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to be authenticated and visit a malicious page while logged in.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings to disrupt site functionality, potentially affecting post display limits and site performance, or chain with other vulnerabilities for more severe impact.

🟠

Likely Case

Attackers trick administrators into changing plugin configuration settings, potentially affecting how posts are displayed or limited on the site.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts would fail, leaving the plugin configuration unchanged.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize, though they require social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.5

Vendor Advisory: https://patchstack.com/database/vulnerability/auto-limit-posts-reloaded/wordpress-auto-limit-posts-reloaded-plugin-2-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Auto Limit Posts Reloaded. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the vulnerable plugin until patched version is available

wp plugin deactivate auto-limit-posts-reloaded

CSRF Protection via Security Plugin

all

Install a WordPress security plugin that provides additional CSRF protection

🧯 If You Can't Patch

  • Implement strict access controls and limit admin session durations
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Auto Limit Posts Reloaded > View version details

Check Version:

wp plugin get auto-limit-posts-reloaded --field=version

Verify Fix Applied:

Verify plugin version is > 2.5 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin.php with auto_limit_posts_reloaded parameters from unexpected referrers

Network Indicators:

  • HTTP requests with suspicious referrer headers targeting plugin admin endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND query_string="*auto_limit_posts_reloaded*" AND NOT referrer="*yourdomain.com*")

🔗 References

📤 Share & Export