CVE-2023-50900

4.3 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in the Averta Master Slider WordPress plugin. Attackers can trick authenticated administrators into performing unintended actions like changing plugin settings or deleting sliders. This affects WordPress sites using Master Slider versions up to 3.9.10.

💻 Affected Systems

Products:
  • Averta Master Slider WordPress Plugin
Versions: All versions up to and including 3.9.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Master Slider plugin installed and activated. Requires authenticated admin user to be tricked.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an administrator into deleting all sliders, changing critical settings, or potentially performing other administrative actions within the plugin's capabilities.

🟠

Likely Case

Attackers would typically use this to disrupt slider functionality, modify slider content, or cause minor site configuration changes.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is minimal as it requires social engineering and authenticated admin sessions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and relatively simple to execute, but require social engineering to trick authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.11 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/master-slider/wordpress-master-slider-plugin-3-9-10-cross-site-request-forgery-csrf-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Master Slider and click 'Update Now' if available. 4. Alternatively, download version 3.9.11+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add security headers to WordPress to help prevent CSRF attacks

Add to .htaccess: Header set X-Frame-Options "SAMEORIGIN"
Add to .htaccess: Header set Content-Security-Policy "frame-ancestors 'self'"

Restrict Admin Access

all

Limit admin panel access to trusted IP addresses only

Add to .htaccess: <Files "wp-login.php">\nOrder Deny,Allow\nDeny from all\nAllow from 192.168.1.0/24\n</Files>

🧯 If You Can't Patch

  • Temporarily disable the Master Slider plugin until patching is possible
  • Implement additional WordPress security plugins with CSRF protection features

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Master Slider version. If version is 3.9.10 or lower, you are vulnerable.

Check Version:

wp plugin list --name=master-slider --field=version

Verify Fix Applied:

After updating, verify Master Slider version is 3.9.11 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to wp-admin/admin-ajax.php with master-slider actions from unexpected referrers
  • Unusual slider modifications or deletions in plugin logs

Network Indicators:

  • CSRF attack patterns with forged requests to master-slider endpoints
  • Requests with missing or mismatched nonce tokens

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND action="master-slider-*") AND referrer NOT CONTAINS "yourdomain.com"

🔗 References

📤 Share & Export