CVE-2024-4382

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in the CB (legacy) WordPress plugin allows attackers to trick logged-in administrators into performing unauthorized bulk actions like deleting codes, timeframes, and bookings. Any WordPress site using the vulnerable plugin versions is affected, particularly those with administrator accounts that might visit malicious pages while authenticated.

💻 Affected Systems

Products:
  • CB (legacy) WordPress plugin
Versions: through 0.9.4.18
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active and administrator accounts that could be tricked into visiting malicious pages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete all booking data, codes, and timeframes, causing complete data loss and service disruption for the affected WordPress site.

🟠

Likely Case

Partial data deletion or modification of booking systems, leading to operational issues and potential financial/reputation damage.

🟢

If Mitigated

With proper CSRF protections or plugin updates, the risk is eliminated as legitimate anti-CSRF tokens would block unauthorized requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated admins, but the CSRF attack itself is technically simple once the target visits a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.4.19 or later

Vendor Advisory: https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'CB (legacy)' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the CB (legacy) plugin until patched

wp plugin deactivate cb-legacy

Implement CSRF protection middleware

all

Add custom WordPress filter to validate nonce tokens for bulk actions

Add custom PHP code to theme functions.php or create a security plugin

🧯 If You Can't Patch

  • Restrict administrator account usage to dedicated admin workstations only
  • Implement web application firewall rules to detect and block CSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > CB (legacy) version number

Check Version:

wp plugin get cb-legacy --field=version

Verify Fix Applied:

Confirm plugin version is 0.9.4.19 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE/POST requests to /wp-admin/admin.php?page=cb-legacy from same session without referrer validation
  • Unexpected bulk deletion events in booking/code logs

Network Indicators:

  • HTTP requests to bulk action endpoints without proper Referer headers or nonce parameters

SIEM Query:

source="wordpress.log" AND ("cb-legacy" OR "bulk-action") AND (http_method=POST OR http_method=DELETE) AND NOT csrf_token=*

🔗 References

📤 Share & Export