CVE-2024-10480

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to trick logged-in WordPress administrators into changing the 3DPrint Lite plugin settings without their knowledge via Cross-Site Request Forgery (CSRF). Attackers could modify plugin configuration through malicious links or forms. Only WordPress sites using vulnerable versions of the 3DPrint Lite plugin are affected.

💻 Affected Systems

Products:
  • 3DPrint Lite WordPress Plugin
Versions: All versions before 2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the 3DPrint Lite plugin enabled and an administrator logged in.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable security features, change critical settings, or redirect users to malicious sites by manipulating plugin configuration.

🟠

Likely Case

Attackers modify plugin settings to degrade functionality, change display options, or alter plugin behavior in unwanted ways.

🟢

If Mitigated

With proper CSRF protections, no unauthorized settings changes can occur even if administrators click malicious links.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an administrator into clicking a malicious link while authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1

Vendor Advisory: https://wpscan.com/vulnerability/725ac766-c849-49d6-a968-58fcc2e134c8/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find '3DPrint Lite' and click 'Update Now'. 4. Alternatively, download version 2.1+ from WordPress repository and replace the plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate 3dprint-lite

Restrict Admin Access

all

Limit administrator access to trusted networks only to reduce attack surface.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attempts.
  • Educate administrators about phishing risks and safe browsing practices.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → 3DPrint Lite → Version. If version is below 2.1, you are vulnerable.

Check Version:

wp plugin get 3dprint-lite --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.1 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=3dprint-lite from unexpected sources
  • Multiple failed CSRF token validations in WordPress logs

Network Indicators:

  • HTTP POST requests to plugin settings endpoints without proper Referer headers
  • Requests containing 3dprint-lite parameters from non-admin sources

SIEM Query:

source="wordpress.log" AND ("3dprint-lite" OR "page=3dprint-lite") AND (POST OR "admin.php")

🔗 References

📤 Share & Export