CVE-2024-13337

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the Clearfy Cache WordPress plugin allows unauthenticated attackers to change plugin settings by tricking administrators into clicking malicious links. All WordPress sites using Clearfy Cache plugin versions up to 2.3.2 are affected. The vulnerability exists due to missing nonce validation on the setup page.

💻 Affected Systems

Products:
  • Clearfy Cache – WordPress optimization plugin
Versions: All versions up to and including 2.3.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to be logged in and tricked into clicking malicious link.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable security features, modify cache settings to break site functionality, or enable malicious configurations that lead to further compromise.

🟠

Likely Case

Attackers change plugin settings to degrade site performance, disable optimizations, or enable tracking/analytics settings that benefit the attacker.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts fail and no settings are modified.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. No authentication required, but requires social engineering to trick admin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3268278/clearfy/trunk/libs/factory/templates/pages/setup-parts/class-step-form.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find Clearfy Cache plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Clearfy Cache Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate clearfy

Add CSRF Protection Manually

all

Add nonce validation to the vulnerable setup-wbcr_clearfy page via custom code.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit cross-origin requests.
  • Use browser extensions that block CSRF attempts and educate administrators about phishing risks.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Clearfy Cache → Version. If version is 2.3.2 or lower, you are vulnerable.

Check Version:

wp plugin get clearfy --field=version

Verify Fix Applied:

After update, verify Clearfy Cache plugin version is 2.3.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=setup-wbcr_clearfy without proper referrer/nonce
  • Multiple failed nonce validation attempts

Network Indicators:

  • Cross-origin requests to WordPress admin endpoints from unexpected domains

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND query_string="page=setup-wbcr_clearfy") AND http_method="POST"

🔗 References

📤 Share & Export