CVE-2024-3476
📋 TL;DR
The Side Menu Lite WordPress plugin before version 4.2.1 lacks CSRF protection on certain bulk actions, allowing attackers to trick logged-in administrators into performing unauthorized actions like deleting menu buttons. This affects WordPress sites using vulnerable versions of the plugin with administrator accounts.
💻 Affected Systems
- Side Menu Lite WordPress plugin
📦 What is this software?
Side Menu Lite by Wow Company
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete all menu buttons, disrupt site functionality, or potentially chain with other vulnerabilities for further compromise.
Likely Case
Unauthorized deletion of menu buttons leading to site navigation issues and requiring manual restoration.
If Mitigated
Minimal impact if CSRF tokens are implemented or administrators avoid suspicious links.
🎯 Exploit Status
Exploitation requires tricking an administrator into clicking a malicious link while logged in.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.1
Vendor Advisory: https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Side Menu Lite and update to version 4.2.1 or later. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Side Menu Lite plugin to prevent exploitation.
wp plugin deactivate side-menu-lite
🧯 If You Can't Patch
- Restrict administrator access to trusted networks only.
- Educate administrators to avoid clicking untrusted links while logged in.
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 4.2.1, it is vulnerable.
Check Version:
wp plugin get side-menu-lite --field=version
Verify Fix Applied:
Confirm plugin version is 4.2.1 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual bulk deletion actions in WordPress logs
- CSRF-related errors in web server logs
Network Indicators:
- HTTP POST requests to plugin admin endpoints without referrer headers
SIEM Query:
source="wordpress.log" AND "side-menu-lite" AND "delete" AND user_role="administrator"