4 CSRF - Cross-Site Request Forgery - WordPress Security DEC, 2020
Be informed about the latest Cross-Site Request Forgery, identified and reported publicly in December 2020. As these WordPress Security vulnerabilities have a severe negative impact for any website, consider a security AUDIT. The following PLUGINS made headlines just last month.
- Site Offline Or Coming Soon Or Maintenance Mode < 1.4.4 - Multiple Cross-Site Request Forgery
- Site offline is provide you a retina ready template with countdown. Just one and it’s enable. Easy to setup and easy to manage. Active installations: 40,000+
- Redux – Gutenberg Blocks Library & Framework 4.1.22 - 4.1.23 - CSRF Nonce Validation Bypass
- Redux – Quickly create full pages in WordPress’ Gutenberg. Supercharge the Gutenberg editor with our ever-growing library of WordPress Blocks and templates. Discover what’s possible and implement any design on your website in virtually no time at all. Active installations: 1+ million
- Redux – Gutenberg Blocks Library & Framework < 4.1.21 - CSRF Nonce Validation Bypass
- Redux – Quickly create full pages in WordPress’ Gutenberg. Supercharge the Gutenberg editor with our ever-growing library of WordPress Blocks and templates. Discover what’s possible and implement any design on your website in virtually no time at all. Active installations: 1+ million
- Ultimate Category Excluder < 1.2 - Cross-Site Request Forgery
- Ultimate Category Excluder, abbreviated as UCE, is a WordPress plugin that allows you to quickly and easily exclude categories from your front page, archives, feeds, and searches. Just select which categories you want to be excluded, and UCE does all the work for you! Active installations: 50,000+
Protect your WordPress: BEFORE IT'S TOO LATE! You will also protect your customers, your reputation and your online business!
BRIEF: Cross-site request forgery is a type of malicious exploit of a website where unauthorised commands are submitted from a user that the web application trusts. Cross-site request forgery is also known as one-click attack, session riding, CSRF, XSRF, Sea Surf, Session Riding, Cross-Site Reference Forgery, or Hostile Linking.
What is Cross-site request forgery?
Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partly circumvent the same-origin policy, which is designed to prevent different websites from interfering with each other. Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker’s choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state-changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
What is the impact of a CSRF attack?
In a successful CSRF attack, the attacker causes the victim user to act unintentionally. Example: this might be to change the email address on their account, to change their password, or to make a funds transfer. Depending on the nature of the action, the attacker might be able to gain full control over the user’s account. If the compromised user has a privileged role within the application, then the attacker might be able to take full control of all the application’s data and functionality.
Get Healthy, Stay Healthy: A healthier online business starts today and it begins with you!