CVE-2024-37940

7.4 HIGH

📋 TL;DR

This CSRF vulnerability in Seraphinite Accelerator WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions, specifically arbitrary file deletion. It affects all versions up to 2.21.13 of the premium plugin. WordPress sites using this plugin are vulnerable if administrators visit malicious pages while logged in.

💻 Affected Systems

Products:
  • Seraphinite Solutions Seraphinite Accelerator (Full, premium)
Versions: All versions up to and including 2.21.13
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to be authenticated and visit malicious page. Only affects premium version of plugin.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website compromise through deletion of critical WordPress files, leading to site unavailability, data loss, and potential privilege escalation.

🟠

Likely Case

Partial website disruption through deletion of theme/plugin files, causing broken functionality and requiring restoration from backups.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or administrators avoid suspicious links while authenticated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick administrators.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.21.13

Vendor Advisory: https://patchstack.com/database/vulnerability/seraphinite-accelerator-ext/wordpress-seraphinite-accelerator-full-premium-plugin-2-21-13-csrf-leading-to-arbitrary-file-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Seraphinite Accelerator (Full, premium). 4. Click 'Update Now' if available. 5. Alternatively, download latest version from vendor and upload via FTP.

🔧 Temporary Workarounds

CSRF Protection via WordPress Nonces

all

Implement custom nonce verification for plugin actions

Add wp_nonce_field() and wp_verify_nonce() checks to plugin forms and actions

Disable Plugin

all

Temporarily disable vulnerable plugin until patched

Navigate to WordPress Plugins → Installed Plugins → Deactivate Seraphinite Accelerator

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attempts
  • Educate administrators to log out of WordPress when not actively managing site

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Seraphinite Accelerator version. If version is 2.21.13 or lower, you are vulnerable.

Check Version:

WordPress: Check Plugins page or use wp plugin list --field=version --name=seraphinite-accelerator-ext

Verify Fix Applied:

Verify plugin version is higher than 2.21.13 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple file deletion requests from same administrator session
  • POST requests to plugin endpoints without referrer headers

Network Indicators:

  • Unusual file deletion patterns via WordPress XML-RPC or admin-ajax.php

SIEM Query:

source="wordpress.log" AND ("wp-content/plugins/seraphinite-accelerator" AND "delete")

🔗 References

📤 Share & Export