CVE-2023-5424
📋 TL;DR
The WS Form LITE WordPress plugin versions up to 1.9.217 contain a CSV injection vulnerability that allows unauthenticated attackers to embed malicious formulas in exported CSV files. When users download and open these files in spreadsheet applications like Excel or LibreOffice, the formulas can execute arbitrary code on the local system. This affects WordPress sites using the vulnerable plugin version.
💻 Affected Systems
- WS Form LITE WordPress Plugin
📦 What is this software?
Ws Form by Westguardsolutions
Ws Form by Westguardsolutions
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution on user workstations when malicious CSV files are opened with vulnerable spreadsheet software, potentially leading to full system compromise.
Likely Case
Local code execution on user workstations, data theft, or system manipulation through malicious formulas in downloaded CSV files.
If Mitigated
Limited impact if users open CSV files in text editors or properly configured spreadsheet software that disables formula execution.
🎯 Exploit Status
Exploitation requires social engineering to get users to open malicious CSV files. No authentication needed to trigger the vulnerable export functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.218 and later
Vendor Advisory: https://wsform.com/changelog/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WS Form LITE and click 'Update Now'. 4. Verify version is 1.9.218 or higher.
🔧 Temporary Workarounds
Disable CSV Export
allTemporarily disable CSV export functionality in WS Form LITE settings
Sanitize Form Inputs
allAdd input validation to prevent formula characters (=, +, -, @) in form submissions
🧯 If You Can't Patch
- Disable the WS Form LITE plugin entirely until patched
- Educate users to never open CSV files from untrusted sources in spreadsheet applications
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for WS Form LITE version. If version is 1.9.217 or lower, you are vulnerable.
Check Version:
wp plugin list --name='WS Form LITE' --field=version
Verify Fix Applied:
After updating, verify WS Form LITE version shows 1.9.218 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Multiple CSV export requests from single IP
- Form submissions containing formula characters (=, +, -, @)
Network Indicators:
- Unusual CSV download patterns from form endpoints
SIEM Query:
source="wordpress" AND (plugin="ws-form" OR uri="/wp-content/plugins/ws-form/") AND (action="export" OR filetype="csv")
🔗 References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098265%40ws-form&new=3098265%40ws-form&sfp_email=&sfph_mail=
- https://wsform.com/changelog/?utm_source=wp_plugins&utm_medium=readme
- https://www.wordfence.com/threat-intel/vulnerabilities/id/38ccaa81-77ec-46f2-9bec-d74fa2e093f3?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098265%40ws-form&new=3098265%40ws-form&sfp_email=&sfph_mail=
- https://wsform.com/changelog/?utm_source=wp_plugins&utm_medium=readme
- https://www.wordfence.com/threat-intel/vulnerabilities/id/38ccaa81-77ec-46f2-9bec-d74fa2e093f3?source=cve