CVE-2023-47180

6.5 MEDIUM

📋 TL;DR

CVE-2023-47180 is a missing authorization vulnerability in the Finale Lite WordPress plugin that allows attackers to delete arbitrary content without proper authentication. This affects all WordPress sites running Finale Lite versions up to 2.16.0. The vulnerability stems from insufficient access controls on certain plugin functions.

💻 Affected Systems

Products:
  • Finale Lite - Sales Countdown Timer & Discount for WooCommerce
Versions: All versions up to and including 2.16.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Finale Lite plugin activated. Requires WordPress and WooCommerce to be present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical website content including posts, pages, products, or plugin data, potentially causing complete website disruption and data loss.

🟠

Likely Case

Unauthorized users deleting website content, disrupting e-commerce functionality, and causing business impact for WooCommerce stores.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized administrators can perform content deletion operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows arbitrary content deletion without authentication. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.16.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/finale-woocommerce-sales-countdown-timer-discount/vulnerability/wordpress-finale-lite-sales-countdown-timer-discount-for-woocommerce-plugin-2-16-0-arbitrary-content-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Finale Lite plugin
4. Click 'Update Now' if update is available
5. Alternatively, download version 2.16.1+ from WordPress repository
6. Deactivate old version and upload new version
7. Activate updated plugin

🔧 Temporary Workarounds

Disable Finale Lite Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate finale-woocommerce-sales-countdown-timer-discount

Restrict Access to WordPress Admin

linux

Implement IP whitelisting for WordPress admin area

# Add to .htaccess for Apache:
Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
Allow from 10.0.0.0/8
# Add to nginx config:
location /wp-admin {
    allow 192.168.1.0/24;
    allow 10.0.0.0/8;
    deny all;
}

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized content deletion requests
  • Enable comprehensive logging and monitoring for unauthorized content modification attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Finale Lite version. If version is 2.16.0 or lower, you are vulnerable.

Check Version:

wp plugin get finale-woocommerce-sales-countdown-timer-discount --field=version

Verify Fix Applied:

Verify plugin version is 2.16.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to wp-admin/admin-ajax.php with action parameters related to content deletion
  • Unexpected content deletion events in WordPress logs
  • Multiple 200 OK responses to admin-ajax.php from unauthenticated IPs

Network Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php from external IPs
  • Multiple content deletion requests in short timeframes

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" AND "action=*delete*" OR "action=*remove*") AND NOT (user="admin" OR user="administrator")

🔗 References

📤 Share & Export