CVE-2024-8286

6.5 MEDIUM

📋 TL;DR

This Cross-Site Request Forgery (CSRF) vulnerability in the WebToffee GDPR Cookie Consent WordPress plugin allows attackers to trick logged-in administrators into performing unauthorized bulk actions. Attackers could delete visit logs or potentially perform other administrative functions without consent. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • WebToffee GDPR Cookie Consent WordPress Plugin
Versions: All versions before 2.6.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin enabled and requires an authenticated admin user to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete all visitor tracking data, disrupt compliance reporting, or potentially perform other administrative actions if additional vulnerable endpoints exist.

🟠

Likely Case

Attackers delete visitor logs to hide evidence of other attacks or disrupt website analytics.

🟢

If Mitigated

No impact if proper CSRF protections are in place or plugin is updated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. Requires social engineering to trick admin into clicking malicious link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.1

Vendor Advisory: https://wpscan.com/vulnerability/628bbac0-76b1-4666-9c00-bae84b48f85c/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'GDPR Cookie Consent' plugin. 4. Click 'Update Now' if available, or download version 2.6.1+ from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate webtoffee-gdpr-cookie-consent

CSRF Protection Middleware

all

Implement additional CSRF protection at web server or application level

🧯 If You Can't Patch

  • Restrict admin access to trusted networks only
  • Implement strict Content Security Policy (CSP) headers

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. Look for 'GDPR Cookie Consent' version number.

Check Version:

wp plugin get webtoffee-gdpr-cookie-consent --field=version

Verify Fix Applied:

Verify plugin version is 2.6.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected bulk delete operations in WordPress admin logs
  • CSRF token validation failures

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with bulk action parameters from unexpected referrers

SIEM Query:

source="wordpress" action="bulk_delete" plugin="gdpr-cookie-consent"

🔗 References

📤 Share & Export