CVE-2024-38345

8.1 HIGH

📋 TL;DR

A cross-site request forgery (CSRF) vulnerability in Sola Testimonials WordPress plugin versions before 3.0.0 allows attackers to trick authenticated users into performing unintended actions on the WordPress site. This affects WordPress sites running vulnerable versions of the Sola Testimonials plugin. Attackers can exploit this by luring logged-in users to malicious web pages.

💻 Affected Systems

Products:
  • Sola Testimonials WordPress Plugin
Versions: All versions prior to 3.0.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Sola Testimonials plugin enabled and at least one authenticated user.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform administrative actions like adding/removing users, changing settings, or modifying content through the authenticated user's session, potentially leading to site compromise or data loss.

🟠

Likely Case

Attackers trick users into performing actions like deleting testimonials, changing plugin settings, or performing other plugin-specific operations without their consent.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts would fail, and only authorized actions would be performed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into visiting malicious pages. No authentication bypass is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0

Vendor Advisory: https://wordpress.org/plugins/sola-testimonials/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Sola Testimonials' and click 'Update Now'. 4. Alternatively, download version 3.0.0+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Sola Testimonials plugin until patched

wp plugin deactivate sola-testimonials

Implement CSRF Protection

all

Add custom CSRF tokens to plugin forms if you cannot update immediately

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect CSRF patterns
  • Educate users about not clicking suspicious links while logged into WordPress

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Sola Testimonials version

Check Version:

wp plugin get sola-testimonials --field=version

Verify Fix Applied:

Verify Sola Testimonials plugin version is 3.0.0 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin actions from authenticated users
  • Multiple failed CSRF token validations in WordPress logs

Network Indicators:

  • HTTP requests to plugin endpoints without proper referrer headers
  • Suspicious cross-origin requests to WordPress admin-ajax.php

SIEM Query:

source="wordpress.log" AND ("sola-testimonials" OR "admin-ajax.php") AND ("action=" OR "nonce_failed")

🔗 References

📤 Share & Export