CVE-2024-13437
📋 TL;DR
This Cross-Site Request Forgery vulnerability in the Book a Room WordPress plugin allows attackers to change plugin settings without authentication by tricking administrators into clicking malicious links. All WordPress sites using Book a Room plugin versions 2.9 and earlier are affected. The vulnerability stems from missing security tokens (nonces) on the settings page.
💻 Affected Systems
- Book a Room WordPress Plugin
📦 What is this software?
Book A Room by Heightslibrary
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify booking settings, disable functionality, or redirect users to malicious sites by changing plugin configuration.
Likely Case
Attackers change booking settings to disrupt operations, modify email notifications, or alter booking parameters.
If Mitigated
With proper CSRF protections and admin awareness, impact is minimal as it requires admin interaction.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated admin into clicking malicious link. No authentication needed for the CSRF attack itself.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.10 or later
Vendor Advisory: https://wordpress.org/plugins/book-a-room/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Book a Room plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the Book a Room plugin until patched
wp plugin deactivate book-a-room
🧯 If You Can't Patch
- Implement Content Security Policy with strict directives
- Use browser extensions that block CSRF attempts and educate administrators about phishing risks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for Book a Room version. If version is 2.9 or lower, system is vulnerable.
Check Version:
wp plugin get book-a-room --field=version
Verify Fix Applied:
Verify Book a Room plugin version is 2.10 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /wp-admin/admin.php?page=bookaroom_Settings from unusual sources
- Unexpected changes to plugin settings
Network Indicators:
- HTTP POST requests to plugin settings endpoint without proper referrer headers
SIEM Query:
source="wordpress.log" AND "bookaroom_Settings" AND method="POST"