CVE-2023-6390
📋 TL;DR
This vulnerability in the WordPress Users plugin allows attackers to trick logged-in administrators into changing plugin settings without their consent via Cross-Site Request Forgery (CSRF). Attackers can exploit this by getting an admin to click a malicious link while authenticated. All WordPress sites using the vulnerable plugin version are affected.
💻 Affected Systems
- WordPress Users plugin
📦 What is this software?
Wordpress Users by Jonathonkemp
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify plugin settings to disable security features, change user permissions, or redirect site visitors to malicious sites, potentially leading to complete site compromise.
Likely Case
Attackers would typically change settings to weaken site security, modify user roles, or inject malicious content into the site.
If Mitigated
With proper CSRF protections and admin awareness, exploitation risk is minimal as it requires admin interaction.
🎯 Exploit Status
Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5 or later
Vendor Advisory: https://wpscan.com/vulnerability/a0ca68d3-f885-46c9-9f6b-b77ad387d25d/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'WordPress Users' plugin. 4. Click 'Update Now' if available, or manually update to version 1.5+. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable WordPress Users Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate users
Implement CSRF Protection
allAdd custom CSRF tokens to plugin settings forms via custom code or security plugin.
🧯 If You Can't Patch
- Restrict admin access to trusted networks only
- Implement strict Content Security Policy (CSP) headers
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins → WordPress Users version. If version is 1.4 or earlier, you are vulnerable.
Check Version:
wp plugin get users --field=version
Verify Fix Applied:
Verify plugin version is 1.5 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin setting changes in WordPress logs
- Admin user actions from unexpected IP addresses
Network Indicators:
- HTTP POST requests to /wp-admin/admin.php?page=users with missing nonce parameters
SIEM Query:
source="wordpress" AND (event="plugin_settings_changed" OR uri="/wp-admin/admin.php?page=users")