CVE-2023-7229

5.5 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in the illi Link Party! WordPress plugin. Attackers can trick logged-in administrators into unknowingly changing plugin settings through malicious links or forms. Only WordPress sites using this specific plugin are affected.

💻 Affected Systems

Products:
  • illi Link Party! WordPress plugin
Versions: All versions through 1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the illi Link Party! plugin installed and activated. Requires an authenticated administrator to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings to redirect users to malicious sites, inject malicious content, or disable security features, potentially leading to site compromise or data theft.

🟠

Likely Case

Attackers could change plugin settings to display unwanted content, redirect users to advertising sites, or modify functionality in ways that degrade user experience.

🟢

If Mitigated

With proper CSRF protections in place, no unauthorized setting changes can occur even if administrators visit malicious pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an administrator into clicking a malicious link while logged into WordPress. The vulnerability is well-documented in public sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check plugin repository for updates beyond 1.0

Vendor Advisory: https://wpscan.com/vulnerability/d16f6ba0-a47d-413f-a6d4-058910441009/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'illi Link Party!' and check for available updates. 4. If update is available, click 'Update Now'. 5. If no update is available, consider disabling or removing the plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until a patch is available

Navigate to WordPress admin → Plugins → Installed Plugins → Deactivate 'illi Link Party!'

Remove Plugin

all

Completely remove the vulnerable plugin

Navigate to WordPress admin → Plugins → Installed Plugins → Delete 'illi Link Party!'

🧯 If You Can't Patch

  • Implement strict access controls to limit administrator accounts and monitor their activities
  • Use browser extensions that block CSRF attempts or implement additional CSRF protection at the web server level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Find 'illi Link Party!' and check if version is 1.0 or earlier

Check Version:

No direct command - check via WordPress admin interface or examine wp-content/plugins/illi-link-party/ readme.txt file

Verify Fix Applied:

After updating, verify the plugin version is higher than 1.0 in the WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin setting changes in WordPress logs
  • Multiple failed CSRF token validations
  • Administrator account accessing unusual URLs

Network Indicators:

  • POST requests to wp-admin/admin.php?page=illi-link-party without proper referrer headers
  • Unusual outbound connections following admin actions

SIEM Query:

source="wordpress" AND (event="plugin_settings_change" OR event="csrf_validation_failed") AND plugin="illi-link-party"

🔗 References

📤 Share & Export