CVE-2024-3756
📋 TL;DR
The MF Gig Calendar WordPress plugin through version 1.2.1 lacks Cross-Site Request Forgery (CSRF) protection on certain endpoints, allowing attackers to trick authenticated users with Contributor or higher privileges into deleting arbitrary calendar events. This affects WordPress sites using the vulnerable plugin version.
💻 Affected Systems
- MF Gig Calendar WordPress Plugin
📦 What is this software?
Mf Gig Calendar by Mf Gig Calendar Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete all calendar events, causing data loss and disrupting event management functionality on affected WordPress sites.
Likely Case
Targeted deletion of specific events by tricking authenticated users into clicking malicious links, leading to data integrity issues.
If Mitigated
Minimal impact if proper CSRF tokens are implemented or if the plugin is disabled/updated.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated users into visiting malicious pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.2 or later
Vendor Advisory: https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find MF Gig Calendar and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate mf-gig-calendar
Restrict User Roles
allLimit Contributor and higher role assignments to trusted users only.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block CSRF attempts targeting the plugin endpoints.
- Educate users about phishing risks and implement strict access controls for Contributor+ roles.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for MF Gig Calendar version. If version is 1.2.1 or earlier, it's vulnerable.
Check Version:
wp plugin get mf-gig-calendar --field=version
Verify Fix Applied:
After update, verify plugin version shows 1.2.2 or later in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual event deletion patterns in WordPress logs
- Multiple DELETE requests to MF Gig Calendar endpoints from unexpected sources
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action parameters related to event deletion without proper referrer headers
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action="mf_gig_calendar_delete_event")