CVE-2024-10480
📋 TL;DR
This vulnerability allows attackers to trick logged-in WordPress administrators into changing the 3DPrint Lite plugin settings without their knowledge via Cross-Site Request Forgery (CSRF). Attackers could modify plugin configuration through malicious links or forms. Only WordPress sites using vulnerable versions of the 3DPrint Lite plugin are affected.
💻 Affected Systems
- 3DPrint Lite WordPress Plugin
📦 What is this software?
3dprint Lite by Wp3dprinting
⚠️ Risk & Real-World Impact
Worst Case
Attackers could disable security features, change critical settings, or redirect users to malicious sites by manipulating plugin configuration.
Likely Case
Attackers modify plugin settings to degrade functionality, change display options, or alter plugin behavior in unwanted ways.
If Mitigated
With proper CSRF protections, no unauthorized settings changes can occur even if administrators click malicious links.
🎯 Exploit Status
Exploitation requires social engineering to trick an administrator into clicking a malicious link while authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1
Vendor Advisory: https://wpscan.com/vulnerability/725ac766-c849-49d6-a968-58fcc2e134c8/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find '3DPrint Lite' and click 'Update Now'. 4. Alternatively, download version 2.1+ from WordPress repository and replace the plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate 3dprint-lite
Restrict Admin Access
allLimit administrator access to trusted networks only to reduce attack surface.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block CSRF attempts.
- Educate administrators about phishing risks and safe browsing practices.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → 3DPrint Lite → Version. If version is below 2.1, you are vulnerable.
Check Version:
wp plugin get 3dprint-lite --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 2.1 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin.php?page=3dprint-lite from unexpected sources
- Multiple failed CSRF token validations in WordPress logs
Network Indicators:
- HTTP POST requests to plugin settings endpoints without proper Referer headers
- Requests containing 3dprint-lite parameters from non-admin sources
SIEM Query:
source="wordpress.log" AND ("3dprint-lite" OR "page=3dprint-lite") AND (POST OR "admin.php")