CVE-2024-47644

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in Copyscape Premium WordPress plugin allows attackers to trick authenticated administrators into executing malicious actions, leading to stored cross-site scripting (XSS). Attackers can inject malicious scripts that persist on the website and execute in visitors' browsers. This affects all WordPress sites using Copyscape Premium plugin versions up to 1.3.6.

💻 Affected Systems

Products:
  • Copyscape Premium WordPress Plugin
Versions: n/a through 1.3.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Copyscape Premium plugin enabled and administrator access to trigger the CSRF.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that steal administrator credentials, deface websites, redirect visitors to malicious sites, or install backdoors for complete site compromise.

🟠

Likely Case

Attackers create fake admin actions that inject malicious JavaScript payloads into website content, leading to session hijacking, credential theft, or content manipulation for visitors.

🟢

If Mitigated

With proper CSRF tokens and input validation, the vulnerability is prevented, though the underlying XSS risk in the plugin remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a crafted page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/copyscape-premium/wordpress-copyscape-premium-plugin-1-3-6-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Copyscape Premium and click 'Update Now'. 4. Alternatively, download version 1.3.7+ from WordPress repository and manually replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable Copyscape Premium plugin until patched.

wp plugin deactivate copyscape-premium

CSRF Protection Middleware

all

Implement custom CSRF protection at web server or application level.

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Copyscape Premium version. If version is 1.3.6 or earlier, you are vulnerable.

Check Version:

wp plugin get copyscape-premium --field=version

Verify Fix Applied:

After update, verify version shows 1.3.7 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Copyscape Premium admin endpoints without referrer headers
  • Unexpected JavaScript injection in database content

Network Indicators:

  • CSRF attack patterns with crafted requests to /wp-admin/admin.php?page=copyscape-premium

SIEM Query:

source="wordpress.log" AND (uri="/wp-admin/admin.php?page=copyscape-premium" AND method="POST" AND NOT referer="*wp-admin*")

🔗 References

📤 Share & Export