CVE-2024-35770

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the Vimeography WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites running Vimeography plugin versions up to 2.4.1. Attackers could modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • Vimeography: Vimeo Video Gallery WordPress Plugin
Versions: n/a through 2.4.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reconfigure the plugin to embed malicious content, redirect visitors to malicious sites, or disrupt video gallery functionality across the entire WordPress site.

🟠

Likely Case

Attackers modify plugin settings to display unwanted content or advertisements, potentially damaging site reputation and user experience.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to unsuccessful attack attempts with no actual changes made.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks require user interaction (admin must be tricked into clicking malicious link while authenticated).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/vimeography/wordpress-vimeography-plugin-2-4-1-cross-site-request-forgery-csrf-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Vimeography plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

CSRF Protection via Security Plugin

all

Install and configure a WordPress security plugin that provides CSRF protection

Temporary Plugin Deactivation

all

Deactivate Vimeography plugin until patched

🧯 If You Can't Patch

  • Implement strict access controls and limit admin session durations
  • Educate administrators about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Vimeography plugin version. If version is 2.4.1 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=vimeography --field=version

Verify Fix Applied:

Verify plugin version is 2.4.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin configuration changes
  • Multiple failed CSRF token validations

Network Indicators:

  • Unexpected POST requests to wp-admin/admin-ajax.php with plugin-specific actions

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action CONTAINS "vimeography")

🔗 References

📤 Share & Export