CVE-2024-54355

4.3 MEDIUM

📋 TL;DR

This Cross-Site Request Forgery (CSRF) vulnerability in the WP Mailster WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions. It affects all WP Mailster installations from unknown versions through 1.8.17.0. Attackers could modify plugin settings or perform other administrative actions without the victim's knowledge.

💻 Affected Systems

Products:
  • WP Mailster WordPress Plugin
Versions: n/a through 1.8.17.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with WP Mailster plugin enabled are affected. The vulnerability requires an authenticated administrator to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reconfigure the email plugin to intercept or redirect all emails, potentially exposing sensitive communications or enabling further attacks through email-based phishing.

🟠

Likely Case

Attackers modify plugin settings to disrupt email functionality or change configuration to less secure settings, causing operational impact.

🟢

If Mitigated

With proper CSRF protections and user awareness, the risk is minimal as it requires user interaction and authentication.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated administrators into clicking malicious links. No authentication bypass is needed as the attack relies on the victim's existing session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.18.0 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-mailster/vulnerability/wordpress-wp-mailster-plugin-1-8-17-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Mailster and click 'Update Now' if available. 4. Alternatively, download version 1.8.18.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

all

Add Content Security Policy headers to restrict cross-origin requests

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';";

Temporary Plugin Deactivation

linux

Disable WP Mailster plugin until patched

wp plugin deactivate wp-mailster

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies for WordPress admin sessions
  • Educate administrators about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Mailster version. If version is 1.8.17.0 or earlier, you are vulnerable.

Check Version:

wp plugin get wp-mailster --field=version

Verify Fix Applied:

Verify WP Mailster version is 1.8.18.0 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin configuration changes in WordPress logs
  • Multiple failed CSRF token validations for WP Mailster endpoints

Network Indicators:

  • Unexpected POST requests to /wp-admin/admin-ajax.php with wp-mailster actions from external referrers

SIEM Query:

source="wordpress.log" AND "wp-mailster" AND ("action=" OR "settings") AND referer NOT CONTAINS "your-domain.com"

🔗 References

📤 Share & Export