CVE-2024-34367

7.1 HIGH

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in the Popup Box WordPress plugin that can lead to Cross-Site Scripting (XSS). Attackers can trick authenticated administrators into executing malicious actions, potentially injecting harmful scripts. This affects WordPress sites using the Popup Box plugin versions up to 4.1.2.

💻 Affected Systems

Products:
  • Popup Box WordPress Plugin
Versions: n/a through 4.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on a WordPress site. The vulnerability is present in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain administrative access to the WordPress site, deface content, steal sensitive data, or install backdoors by tricking an admin into executing malicious requests.

🟠

Likely Case

Attackers inject malicious JavaScript through CSRF, leading to session hijacking, data theft, or unauthorized content modifications when admins view affected pages.

🟢

If Mitigated

With proper CSRF tokens and input validation, the attack would fail, preventing unauthorized actions and script injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated admin user, but CSRF attacks are well-understood and commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ays-popup-box/wordpress-popup-box-plugin-4-1-2-csrf-to-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Popup Box' and click 'Update Now' if available. 4. Alternatively, download version 4.1.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Popup Box plugin to eliminate the vulnerability until patching is possible.

wp plugin deactivate ays-popup-box

Implement CSRF Protection

all

Add custom CSRF tokens to plugin forms via WordPress hooks or a security plugin.

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only to reduce exposure to CSRF attacks.
  • Use browser extensions that block CSRF attempts or enforce same-origin policies.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 4.1.2 or lower, it is vulnerable.

Check Version:

wp plugin get ays-popup-box --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 4.1.3 or higher in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to popup box admin endpoints without referrer headers or CSRF tokens.
  • JavaScript errors or unexpected script injections in admin logs.

Network Indicators:

  • HTTP requests from unexpected origins targeting wp-admin/admin-ajax.php with popup-related actions.

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND action CONTAINS "ays_popup") AND NOT referrer CONTAINS own_domain

🔗 References

📤 Share & Export