CVE-2024-6856
📋 TL;DR
This CSRF vulnerability in the WP MultiTasking WordPress plugin allows attackers to trick authenticated administrators into unknowingly changing plugin settings. Attackers can craft malicious requests that execute when an admin visits a compromised page. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- WP MultiTasking WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify plugin settings to disable security features, inject malicious code, or redirect users to phishing sites, potentially compromising the entire WordPress site.
Likely Case
Attackers could change plugin configurations to degrade functionality, inject ads or tracking scripts, or modify site behavior in ways that benefit the attacker.
If Mitigated
With proper CSRF protections and admin awareness, exploitation attempts would fail, leaving the plugin settings unchanged and the site secure.
🎯 Exploit Status
Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated. No authentication bypass is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.1.13 or later
Vendor Advisory: https://wpscan.com/vulnerability/9700845e-89ca-4f9b-95f0-4b46a975b662/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP MultiTasking plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable WP MultiTasking Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate wp-multitasking
Implement CSRF Protection Manually
allAdd nonce verification to plugin settings update functions if you have development access.
🧯 If You Can't Patch
- Restrict admin access to trusted networks only
- Educate administrators about CSRF risks and safe browsing practices
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is 0.1.12 or earlier, you are vulnerable.
Check Version:
wp plugin get wp-multitasking --field=version
Verify Fix Applied:
After updating, verify plugin version shows 0.1.13 or later in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to wp-admin/admin.php?page=wp-multitasking settings endpoints from unexpected sources
Network Indicators:
- HTTP requests with referer headers pointing to external domains accessing admin settings endpoints
SIEM Query:
source="wordpress.log" AND "wp-multitasking" AND "admin.php" AND (POST OR PUT)