CVE-2024-6857

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in WP MultiTasking WordPress plugin allows attackers to trick logged-in administrators into unknowingly modifying header, footer, and body script settings. Attackers can inject malicious scripts or modify site behavior without proper authentication. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WP MultiTasking WordPress Plugin
Versions: 0.1.12 and earlier
Operating Systems: All (WordPress is platform independent)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with plugin enabled and an admin user logged in. The vulnerability is present in default plugin configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers inject persistent malicious scripts (cryptominers, credential stealers, redirects) that affect all site visitors, potentially leading to data theft, malware distribution, or complete site compromise.

🟠

Likely Case

Attackers modify scripts to insert ads, track users, redirect to malicious sites, or deface the website with injected content.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts fail, leaving the site unaffected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking a logged-in admin into clicking a malicious link or visiting a crafted page. No authentication bypass needed beyond admin session.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.13 or later

Vendor Advisory: https://wpscan.com/vulnerability/97636602-2dd0-465b-b6dc-acb42147edb3/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP MultiTasking plugin. 4. Click 'Update Now' if update available. 5. Alternatively, delete plugin and install latest version from WordPress repository.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available.

wp plugin deactivate wp-multitasking

CSRF Protection via .htaccess

linux

Add basic CSRF protection headers at web server level (partial mitigation).

Header set X-Frame-Options "DENY"
Header set Content-Security-Policy "frame-ancestors 'none'"

🧯 If You Can't Patch

  • Remove WP MultiTasking plugin completely and use alternative solutions for header/footer scripts.
  • Implement strict admin session management: force logout inactive admins, use admin session timeouts, and educate admins about phishing risks.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → WP MultiTasking → Version. If version is 0.1.12 or lower, you are vulnerable.

Check Version:

wp plugin get wp-multitasking --field=version

Verify Fix Applied:

After update, verify plugin version is 0.1.13 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=wp-multitasking from unexpected referrers
  • Multiple failed CSRF token validations in WordPress debug logs

Network Indicators:

  • HTTP requests with suspicious referer headers targeting plugin admin endpoints
  • Unexpected script injections in site HTML headers/footers

SIEM Query:

source="wordpress.log" AND ("wp-multitasking" AND "admin.php") AND referer NOT CONTAINS "yourdomain.com"

🔗 References

📤 Share & Export