CVE-2024-4758

7.6 HIGH

📋 TL;DR

This CSRF vulnerability in the Muslim Prayer Time BD WordPress plugin allows attackers to trick authenticated administrators into resetting plugin settings without their consent. Attackers can craft malicious requests that appear legitimate, causing admins to unknowingly reset configurations when logged in. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Muslim Prayer Time BD WordPress Plugin
Versions: Versions through 2.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled and an authenticated admin session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reset all plugin settings, potentially disrupting prayer time functionality for Muslim users, and if combined with other vulnerabilities, could lead to further compromise of the WordPress site.

🟠

Likely Case

Attackers trick administrators into resetting plugin settings, causing temporary disruption of prayer time display functionality until settings are reconfigured.

🟢

If Mitigated

With proper CSRF protections and admin awareness, the vulnerability would be prevented as legitimate nonce checks would block unauthorized requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.4

Vendor Advisory: https://wpscan.com/vulnerability/64ec57a5-35d8-4c69-bdba-096c2245a0db/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Muslim Prayer Time BD' plugin. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin version is above 2.4.

🔧 Temporary Workarounds

CSRF Protection via WordPress Nonce

all

Manually add CSRF protection to the settings reset functionality by implementing WordPress nonce checks.

Plugin Deactivation

linux

Temporarily deactivate the plugin until patched, though this will disable prayer time functionality.

wp plugin deactivate muslim-prayer-time-bd

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attacks targeting the plugin's reset endpoint.
  • Educate administrators about CSRF risks and advise them to log out of admin sessions when not actively managing the site.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins, find Muslim Prayer Time BD, and verify version is 2.4 or lower.

Check Version:

wp plugin get muslim-prayer-time-bd --field=version

Verify Fix Applied:

After updating, verify plugin version is above 2.4 in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin.php?page=muslim-prayer-time-bd with reset parameters from unexpected sources
  • Admin user sessions with unusual reset actions

Network Indicators:

  • HTTP POST requests to plugin reset endpoints without proper referrer headers or nonce parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query_string="page=muslim-prayer-time-bd" AND method="POST")

🔗 References

📤 Share & Export