CVE-2024-13522

6.1 MEDIUM

📋 TL;DR

This CSRF vulnerability in the magayo Lottery Results WordPress plugin allows attackers to trick administrators into unknowingly changing plugin settings or injecting malicious scripts. All WordPress sites using this plugin up to version 2.0.12 are affected.

💻 Affected Systems

Products:
  • magayo Lottery Results WordPress plugin
Versions: All versions up to and including 2.0.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin active. Attack requires tricking an authenticated admin into clicking a malicious link.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Site takeover through admin account compromise, malware injection, or complete defacement if attackers successfully inject malicious scripts.

🟠

Likely Case

Unauthorized plugin configuration changes, injection of malicious JavaScript or redirects, or SEO spam injection.

🟢

If Mitigated

No impact if proper CSRF protections are in place or the plugin is disabled/removed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an admin, but the technical execution is simple once the admin is tricked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.13 or later

Vendor Advisory: https://wordpress.org/plugins/magayo-lottery-results/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'magayo Lottery Results' and click 'Update Now'. 4. Verify version is 2.0.13 or higher.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate magayo-lottery-results

Remove plugin

all

Completely remove the vulnerable plugin

wp plugin delete magayo-lottery-results

🧯 If You Can't Patch

  • Implement strict CSRF protection at the web application firewall level
  • Restrict admin access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for magayo Lottery Results version 2.0.12 or lower

Check Version:

wp plugin get magayo-lottery-results --field=version

Verify Fix Applied:

Verify plugin version is 2.0.13 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin.php?page=magayo-lottery-results
  • Unexpected plugin setting changes in WordPress logs

Network Indicators:

  • CSRF attack patterns in web traffic
  • Unexpected outbound connections after admin actions

SIEM Query:

source="wordpress" AND (uri="/wp-admin/admin.php?page=magayo-lottery-results" OR plugin="magayo-lottery-results")

🔗 References

📤 Share & Export