CVE-2024-6075
📋 TL;DR
This CSRF vulnerability in the wp-cart-for-digital-products WordPress plugin allows attackers to trick logged-in administrators into performing unauthorized actions without their knowledge. Attackers can create malicious requests that execute when an admin visits a compromised page, potentially modifying plugin settings or performing other administrative actions. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- wp-cart-for-digital-products WordPress plugin
📦 What is this software?
Wp Estore by Tipsandtricks Hq
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify plugin settings, change product prices, manipulate cart functionality, or potentially chain with other vulnerabilities to gain administrative access or compromise the entire WordPress site.
Likely Case
Attackers modify plugin settings or cart functionality to disrupt e-commerce operations, change pricing, or redirect payments.
If Mitigated
With proper CSRF protections and user awareness, impact is limited to unsuccessful attack attempts that get blocked by security controls.
🎯 Exploit Status
CSRF attacks are well-understood and easy to weaponize. Exploitation requires social engineering to trick administrators into visiting malicious pages while logged in.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.5.5
Vendor Advisory: https://wpscan.com/vulnerability/b0e2658a-b075-48b6-a9d9-e141194117fc/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'wp-cart-for-digital-products'. 4. Click 'Update Now' if available, or download version 8.5.5+ from WordPress repository. 5. Activate the updated plugin if deactivated during update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate wp-cart-for-digital-products
CSRF Protection via Security Plugin
allUse security plugins like Wordfence or Sucuri that include CSRF protection
🧯 If You Can't Patch
- Implement strict access controls and limit administrative sessions
- Use browser extensions that block CSRF attempts and educate users about phishing risks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins, find wp-cart-for-digital-products and verify version is below 8.5.5
Check Version:
wp plugin get wp-cart-for-digital-products --field=version
Verify Fix Applied:
Confirm plugin version is 8.5.5 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin setting changes without corresponding admin activity
- Multiple failed CSRF token validations in WordPress logs
Network Indicators:
- POST requests to wp-admin/admin-ajax.php or plugin endpoints without proper referrer headers
- Requests from unexpected sources to plugin endpoints
SIEM Query:
source="wordpress.log" AND ("wp-cart-for-digital-products" AND "action") AND NOT user="admin_user"