CVE-2023-7196

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to trick WordPress administrators into changing the Ultimate Noindex Nofollow Tool plugin settings without their consent. Attackers can craft malicious requests that execute when an admin visits a compromised page, potentially altering SEO settings. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Ultimate Noindex Nofollow Tool WordPress Plugin
Versions: through 1.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin active and an admin user session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable noindex/nofollow settings across the entire site, potentially exposing private content to search engines or altering SEO performance.

🟠

Likely Case

Attackers modify plugin settings to affect SEO visibility, potentially exposing content intended to be hidden from search engines.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts would fail or be detected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.3 or later

Vendor Advisory: https://wpscan.com/vulnerability/15ea1ffd-5a0c-422c-8c9c-7b632516a156/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Ultimate Noindex Nofollow Tool'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available

wp plugin deactivate ultimate-noindex-nofollow-tool

CSRF Protection via .htaccess

linux

Add basic CSRF protection headers at web server level

Header set X-Frame-Options "SAMEORIGIN"
Header set Content-Security-Policy "frame-ancestors 'self'"

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative SEO management tools
  • Implement web application firewall rules to block CSRF attempts to plugin admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.1.2 or earlier, you are vulnerable.

Check Version:

wp plugin get ultimate-noindex-nofollow-tool --field=version

Verify Fix Applied:

Verify plugin version is 1.1.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin.php?page=ultimate-noindex-nofollow-tool from unexpected referrers
  • Admin user settings changes without corresponding admin page visits

Network Indicators:

  • CSRF attack patterns with mismatched Origin/Referer headers targeting plugin admin endpoints

SIEM Query:

source="wordpress.log" AND (uri="/wp-admin/admin.php?page=ultimate-noindex-nofollow-tool" AND http_method="POST") AND NOT (referer CONTAINS "your-domain.com")

🔗 References

📤 Share & Export