CVE-2023-6029
📋 TL;DR
The EazyDocs WordPress plugin before version 2.3.6 lacks proper authorization and CSRF protection, allowing unauthenticated attackers to delete arbitrary WordPress posts and manipulate plugin documents/sections. This affects all WordPress sites running vulnerable versions of the EazyDocs plugin.
💻 Affected Systems
- EazyDocs WordPress Plugin
📦 What is this software?
Eazydocs by Spider Themes
⚠️ Risk & Real-World Impact
Worst Case
Complete website defacement or destruction through deletion of all posts/pages, potentially requiring full restoration from backups.
Likely Case
Selective content deletion or manipulation causing website disruption, data loss, and reputational damage.
If Mitigated
No impact if plugin is patched or disabled; minimal impact if proper web application firewalls are deployed.
🎯 Exploit Status
Simple HTTP requests can trigger the vulnerability without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.3.6
Vendor Advisory: https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find EazyDocs and click 'Update Now'. 4. Verify version shows 2.3.6 or higher.
🔧 Temporary Workarounds
Disable EazyDocs Plugin
allTemporarily deactivate the vulnerable plugin until patching is possible.
wp plugin deactivate eazydocs
Web Application Firewall Rule
allBlock requests to vulnerable EazyDocs endpoints.
🧯 If You Can't Patch
- Disable EazyDocs plugin immediately
- Implement strict network access controls to WordPress admin areas
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → EazyDocs version number. If below 2.3.6, you're vulnerable.
Check Version:
wp plugin get eazydocs --field=version
Verify Fix Applied:
Confirm EazyDocs version shows 2.3.6 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=eazydocs_* from unauthenticated IPs
- Unexpected post deletions in WordPress logs
Network Indicators:
- Unusual traffic to EazyDocs AJAX endpoints from external sources
SIEM Query:
source="wordpress.log" AND ("admin-ajax.php" AND "eazydocs")