CVE-2024-37412

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the Blossom Shop WordPress theme allows attackers to trick authenticated administrators into performing unintended actions. It affects all WordPress sites using Blossom Shop theme versions up to 1.1.7. Attackers could modify theme settings or perform other administrative actions without the admin's knowledge.

💻 Affected Systems

Products:
  • Blossom Shop WordPress Theme
Versions: n/a through 1.1.7
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Blossom Shop theme active and an authenticated admin session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change theme settings, inject malicious code, or modify site configuration leading to defacement, data theft, or further compromise.

🟠

Likely Case

Attackers trick administrators into changing theme settings or configuration, potentially disrupting site appearance or functionality.

🟢

If Mitigated

With proper CSRF protections and admin awareness, impact is minimal as actions require admin authentication and interaction.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated admins into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.8 or later

Vendor Advisory: https://patchstack.com/database/wordpress/theme/blossom-shop/vulnerability/wordpress-blossom-shop-theme-1-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Blossom Shop theme update is available. 4. Click 'Update Now' for Blossom Shop. 5. Verify theme version is 1.1.8 or higher.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection to theme forms and admin actions

Requires custom PHP development to add nonce verification to theme files

Use Security Plugins

all

Install WordPress security plugins that provide CSRF protection

Install plugins like Wordfence, iThemes Security, or Sucuri

🧯 If You Can't Patch

  • Temporarily switch to a different WordPress theme until patch can be applied
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes > Blossom Shop details for version number

Check Version:

wp theme list --field=name,version --format=csv | grep 'blossom-shop'

Verify Fix Applied:

Verify Blossom Shop theme version is 1.1.8 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Multiple theme setting changes from same IP in short timeframe
  • Unexpected theme modifications without admin login records

Network Indicators:

  • POST requests to theme admin endpoints without proper referrer headers
  • Suspicious redirects to theme settings pages

SIEM Query:

source="wordpress.log" AND ("blossom-shop" OR "theme_mod") AND status=200 AND method=POST

🔗 References

📤 Share & Export