CVE-2023-47790
📋 TL;DR
This vulnerability in the Poporon Pz-LinkCard WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to Cross-Site Scripting (XSS). Attackers can trick authenticated administrators into executing malicious actions, potentially injecting malicious scripts into WordPress sites. WordPress administrators using vulnerable plugin versions are affected.
💻 Affected Systems
- Poporon Pz-LinkCard WordPress Plugin
📦 What is this software?
Pz Linkcard by Popozure
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject persistent XSS payloads that steal administrator credentials, deface websites, redirect visitors to malicious sites, or install backdoors for further compromise.
Likely Case
Attackers would inject malicious JavaScript to steal session cookies or perform unauthorized actions on behalf of authenticated users, potentially compromising the WordPress admin panel.
If Mitigated
With proper CSRF tokens and input validation, the attack chain would be broken, preventing both the CSRF and subsequent XSS exploitation.
🎯 Exploit Status
Exploitation requires tricking an authenticated user (typically an administrator) to click a malicious link or visit a crafted page. The vulnerability details and proof-of-concept are publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.9 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Pz-LinkCard' and click 'Update Now'. 4. Alternatively, download version 2.4.9+ from WordPress.org and manually replace the plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Pz-LinkCard plugin until patched
wp plugin deactivate pz-linkcard
Implement CSRF Protection
allAdd custom CSRF tokens to plugin forms if you have development capabilities
🧯 If You Can't Patch
- Restrict plugin access to trusted administrators only and monitor for suspicious activity
- Implement web application firewall (WAF) rules to block CSRF and XSS payloads targeting the plugin endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Pz-LinkCard version. If version is 2.4.8 or lower, you are vulnerable.
Check Version:
wp plugin get pz-linkcard --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 2.4.9 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php or plugin-specific endpoints with suspicious parameters
- Multiple failed CSRF token validations in WordPress debug logs
Network Indicators:
- HTTP requests containing malicious script tags or JavaScript payloads targeting plugin endpoints
- Unexpected redirects or iframe injections from your WordPress site
SIEM Query:
source="wordpress.log" AND ("pz-linkcard" OR "admin-ajax.php") AND ("script" OR "javascript:" OR "onerror=" OR "onload=")
🔗 References
- https://patchstack.com/database/vulnerability/pz-linkcard/wordpress-pz-linkcard-plugin-2-4-8-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/pz-linkcard/wordpress-pz-linkcard-plugin-2-4-8-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve