CVE-2024-3642

6.9 MEDIUM

📋 TL;DR

This vulnerability in the Newsletter Popup WordPress plugin allows attackers to trick logged-in administrators into deleting subscribers without their consent via Cross-Site Request Forgery (CSRF) attacks. The plugin lacks proper CSRF protection on the subscriber deletion functionality. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Newsletter Popup WordPress Plugin
Versions: through version 1.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Newsletter Popup plugin installed and activated. Requires an admin to be logged in and tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete all newsletter subscribers, disrupting communication and potentially causing data loss for marketing campaigns.

🟠

Likely Case

Targeted deletion of specific subscribers or small groups, potentially affecting newsletter delivery and subscriber management.

🟢

If Mitigated

Minimal impact with proper CSRF protections and admin awareness training in place.

🌐 Internet-Facing: HIGH - WordPress admin panels are typically internet-accessible, making CSRF attacks feasible from any location.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have access to internal networks where admin sessions are active.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an admin into clicking a malicious link while logged in. No authentication bypass needed beyond existing admin session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WordPress plugin repository for updates beyond 1.2

Vendor Advisory: https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Newsletter Popup' and check for update notification. 4. Click 'Update Now' if available. 5. If no update available, consider disabling or removing the plugin.

🔧 Temporary Workarounds

Implement CSRF Protection Manually

all

Add nonce verification to the subscriber deletion function in plugin code

Edit plugin PHP files to add wp_verify_nonce() checks before subscriber deletion actions

Use Security Plugin with CSRF Protection

all

Install and configure a WordPress security plugin that provides CSRF protection

Install Wordfence, Sucuri, or similar security plugin and enable CSRF protection features

🧯 If You Can't Patch

  • Disable or remove the Newsletter Popup plugin entirely
  • Implement strict access controls and train administrators to avoid clicking suspicious links while logged in

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Newsletter Popup version. If version is 1.2 or earlier, you are vulnerable.

Check Version:

wp plugin list --name='newsletter-popup' --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify the plugin version is higher than 1.2. Test CSRF protection by attempting to delete a subscriber without proper nonce.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected subscriber deletions in plugin logs
  • Multiple DELETE requests to newsletter endpoints without referrer validation

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=newsletter_delete without proper nonce parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action="newsletter_delete") AND NOT nonce=*

🔗 References

📤 Share & Export