CVE-2024-7568

9.6 CRITICAL

📋 TL;DR

This CSRF vulnerability in the Favicon Generator WordPress plugin allows unauthenticated attackers to delete arbitrary files on the server by tricking administrators into clicking malicious links. WordPress sites using plugin versions up to 1.5 are affected. The vulnerability stems from missing nonce validation in the output_sub_admin_page_0 function.

💻 Affected Systems

Products:
  • WordPress Favicon Generator plugin
Versions: All versions up to and including 1.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator interaction with malicious content.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through deletion of critical system files, leading to website defacement, data loss, or service disruption.

🟠

Likely Case

Selective file deletion causing website functionality issues, data corruption, or partial service disruption.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or plugin is removed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3139340%40favicon-generator&new=3139340%40favicon-generator&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Immediately remove the Favicon Generator plugin from all WordPress installations. 2. Find and install an alternative favicon plugin from the WordPress repository.

🔧 Temporary Workarounds

Disable plugin

all

Deactivate and delete the vulnerable plugin from WordPress admin panel

WordPress Admin → Plugins → Installed Plugins → Deactivate and Delete Favicon Generator

🧯 If You Can't Patch

  • Implement strict CSRF protection at web application firewall level
  • Restrict administrator access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Favicon Generator' with version 1.5 or lower

Check Version:

wp plugin list --name=favicon-generator --field=version

Verify Fix Applied:

Confirm plugin is no longer installed in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in web server logs
  • POST requests to wp-admin/admin.php with favicon-generator parameters

Network Indicators:

  • HTTP requests containing 'favicon-generator' parameters without proper nonce validation

SIEM Query:

source="web_server_logs" AND (uri="/wp-admin/admin.php" AND parameters CONTAINS "favicon-generator")

🔗 References

📤 Share & Export