CVE-2024-6751
📋 TL;DR
The Social Auto Poster WordPress plugin up to version 5.3.14 has a Cross-Site Request Forgery vulnerability due to missing nonce validation. This allows unauthenticated attackers to manipulate post metadata and plugin settings. All WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Social Auto Poster WordPress Plugin
📦 What is this software?
Social Auto Poster by Wpwebinfotech
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify critical plugin settings, alter post metadata to disrupt social media posting, or inject malicious content into posts.
Likely Case
Attackers manipulate social media posting schedules, disable plugin functionality, or corrupt post metadata affecting automated sharing.
If Mitigated
With proper CSRF protections, the vulnerability is neutralized and no unauthorized changes can be made.
🎯 Exploit Status
CSRF attacks typically require user interaction but can be delivered via malicious links or sites.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.15 or later
Vendor Advisory: https://codecanyon.net/item/social-auto-poster-wordpress-scheduler-marketing-plugin/5754169
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Social Auto Poster and click 'Update Now'. 4. Verify version is 5.3.15 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Social Auto Poster plugin until patched
wp plugin deactivate social-auto-poster
Apply CSRF Protection
allImplement custom nonce validation for plugin endpoints
🧯 If You Can't Patch
- Implement web application firewall with CSRF protection rules
- Restrict plugin access to trusted IP addresses only
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins → Social Auto Poster version
Check Version:
wp plugin get social-auto-poster --field=version
Verify Fix Applied:
Confirm plugin version is 5.3.15 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with sap_* actions
- Multiple failed nonce validation attempts
Network Indicators:
- CSRF attack patterns with malicious referrers
- Unexpected modifications to plugin settings
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action="sap_*")
🔗 References
- https://codecanyon.net/item/social-auto-poster-wordpress-scheduler-marketing-plugin/5754169
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d7aceccc-7004-42f2-b085-eade9c45141c?source=cve
- https://codecanyon.net/item/social-auto-poster-wordpress-scheduler-marketing-plugin/5754169
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d7aceccc-7004-42f2-b085-eade9c45141c?source=cve