CVE-2024-43255

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in the MyBookTable Bookstore WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions, which can lead to XSS attacks. It affects all WordPress sites using MyBookTable Bookstore plugin versions up to 3.3.9. Attackers can inject malicious scripts that execute in administrators' browsers.

💻 Affected Systems

Products:
  • MyBookTable Bookstore WordPress Plugin
Versions: n/a through 3.3.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with MyBookTable Bookstore plugin enabled. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent XSS payloads that compromise administrator accounts, leading to complete site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Attackers create fake forms or links that trick logged-in administrators into executing actions that inject malicious JavaScript, potentially stealing session cookies or performing unauthorized administrative actions.

🟢

If Mitigated

With proper CSRF tokens and Content Security Policy (CSP) headers, the attack would fail as requests would be rejected without valid tokens and scripts would be blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a crafted page. The vulnerability chain (CSRF to XSS) is well-documented and weaponization is likely given the public PoC.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.0 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-9-csrf-to-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'MyBookTable Bookstore'. 4. Click 'Update Now' if available. 5. If no update appears, download version 3.4.0+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add security headers to WordPress to help mitigate CSRF attacks

Add to .htaccess: Header set X-Frame-Options "DENY"
Add to .htaccess: Header set Content-Security-Policy "default-src 'self'"
Add to wp-config.php: define('FORCE_SSL_ADMIN', true);

Disable Plugin Temporarily

all

Deactivate the vulnerable plugin until patched

wp plugin deactivate mybooktable
Or via WordPress admin: Plugins > Installed Plugins > MyBookTable Bookstore > Deactivate

🧯 If You Can't Patch

  • Restrict administrative access to trusted IP addresses only using .htaccess or firewall rules.
  • Implement web application firewall (WAF) rules to block CSRF patterns and XSS payloads.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel: Plugins > Installed Plugins, find MyBookTable Bookstore and check version number.

Check Version:

wp plugin get mybooktable --field=version

Verify Fix Applied:

Verify plugin version is 3.4.0 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin endpoints without referrer headers
  • Multiple failed CSRF token validations in WordPress debug logs
  • Unexpected JavaScript injection in plugin settings

Network Indicators:

  • Cross-origin requests to WordPress admin-ajax.php or admin-post.php endpoints
  • Suspicious referrer headers in administrative requests

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" OR "admin-post.php") AND ("action=mybooktable" OR "plugin=mybooktable") AND status=200

🔗 References

📤 Share & Export