CVE-2024-3474
📋 TL;DR
The Wow Skype Buttons WordPress plugin before version 4.0.4 lacks CSRF protection on some bulk actions, allowing attackers to trick logged-in administrators into performing unauthorized actions like deleting buttons. This affects WordPress sites using vulnerable versions of the plugin with administrative users.
💻 Affected Systems
- Wow Skype Buttons WordPress plugin
📦 What is this software?
Wow Skype Buttons by Wow Company
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete all Skype buttons, disrupt communication features, or potentially chain with other vulnerabilities for further compromise.
Likely Case
Malicious actors trick administrators into deleting configured Skype buttons, causing service disruption.
If Mitigated
With proper CSRF protections and user awareness, exploitation risk is minimal.
🎯 Exploit Status
Exploitation requires tricking authenticated admin users into clicking malicious links.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.4
Vendor Advisory: https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Wow Skype Buttons' and click 'Update Now'. 4. Verify version shows 4.0.4 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate wow-skype-buttons
CSRF Protection Middleware
allImplement web application firewall or middleware with CSRF protection.
🧯 If You Can't Patch
- Restrict administrative access to trusted networks only
- Implement user awareness training about phishing and suspicious links
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Wow Skype Buttons → Version. If below 4.0.4, vulnerable.
Check Version:
wp plugin get wow-skype-buttons --field=version
Verify Fix Applied:
Confirm plugin version is 4.0.4 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual bulk delete actions in WordPress logs
- CSRF token validation failures
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with bulk action parameters
SIEM Query:
source="wordpress" action="bulk_delete" plugin="wow-skype-buttons"