CVE-2023-5424

4.7 MEDIUM

📋 TL;DR

The WS Form LITE WordPress plugin versions up to 1.9.217 contain a CSV injection vulnerability that allows unauthenticated attackers to embed malicious formulas in exported CSV files. When users download and open these files in spreadsheet applications like Excel or LibreOffice, the formulas can execute arbitrary code on the local system. This affects WordPress sites using the vulnerable plugin version.

💻 Affected Systems

Products:
  • WS Form LITE WordPress Plugin
Versions: Up to and including 1.9.217
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CSV export feature to be used. Vulnerability is in the plugin itself, not dependent on specific OS or WordPress configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on user workstations when malicious CSV files are opened with vulnerable spreadsheet software, potentially leading to full system compromise.

🟠

Likely Case

Local code execution on user workstations, data theft, or system manipulation through malicious formulas in downloaded CSV files.

🟢

If Mitigated

Limited impact if users open CSV files in text editors or properly configured spreadsheet software that disables formula execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to get users to open malicious CSV files. No authentication needed to trigger the vulnerable export functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.218 and later

Vendor Advisory: https://wsform.com/changelog/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WS Form LITE and click 'Update Now'. 4. Verify version is 1.9.218 or higher.

🔧 Temporary Workarounds

Disable CSV Export

all

Temporarily disable CSV export functionality in WS Form LITE settings

Sanitize Form Inputs

all

Add input validation to prevent formula characters (=, +, -, @) in form submissions

🧯 If You Can't Patch

  • Disable the WS Form LITE plugin entirely until patched
  • Educate users to never open CSV files from untrusted sources in spreadsheet applications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WS Form LITE version. If version is 1.9.217 or lower, you are vulnerable.

Check Version:

wp plugin list --name='WS Form LITE' --field=version

Verify Fix Applied:

After updating, verify WS Form LITE version shows 1.9.218 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Multiple CSV export requests from single IP
  • Form submissions containing formula characters (=, +, -, @)

Network Indicators:

  • Unusual CSV download patterns from form endpoints

SIEM Query:

source="wordpress" AND (plugin="ws-form" OR uri="/wp-content/plugins/ws-form/") AND (action="export" OR filetype="csv")

🔗 References

📤 Share & Export