CVE-2024-1755

8.8 HIGH

📋 TL;DR

The NPS computy WordPress plugin through version 2.7.5 lacks Cross-Site Request Forgery (CSRF) protection on certain endpoints, allowing attackers to trick authenticated users into performing unintended actions. This affects WordPress sites using the vulnerable plugin version. Attackers could manipulate user accounts or modify site settings without the user's knowledge.

💻 Affected Systems

Products:
  • NPS computy WordPress plugin
Versions: Versions up to and including 2.7.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. The plugin must have endpoints without CSRF protection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could compromise administrator accounts, modify site content, install malicious plugins/themes, or take full control of the WordPress site.

🟠

Likely Case

Attackers could manipulate user profiles, change settings, or perform actions within the plugin's functionality that the authenticated user has permission to do.

🟢

If Mitigated

With proper CSRF tokens and validation, requests would be rejected unless they originate from legitimate user sessions with valid tokens.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user into visiting a malicious page. No authentication bypass is needed beyond the victim's existing session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.6 or later

Vendor Advisory: https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'NPS computy' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the NPS computy plugin until patched

wp plugin deactivate nps-computy

Implement web application firewall rules

all

Configure WAF to block CSRF attempts targeting plugin endpoints

🧯 If You Can't Patch

  • Restrict plugin access to trusted users only and implement additional authentication for sensitive actions
  • Monitor WordPress logs for unusual POST requests to plugin endpoints and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for NPS computy version. If version is 2.7.5 or earlier, system is vulnerable.

Check Version:

wp plugin get nps-computy --field=version

Verify Fix Applied:

Verify plugin version is 2.7.6 or later in WordPress admin panel. Test plugin functionality to ensure CSRF protection is working.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to NPS computy plugin endpoints from same IP with different user agents
  • Unusual plugin actions performed by users without corresponding page views

Network Indicators:

  • HTTP requests to plugin endpoints without Referer headers or with external origins
  • POST requests containing plugin-specific parameters from unexpected sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "nps-computy") AND http_method="POST" AND NOT referer CONTAINS domain

🔗 References

📤 Share & Export