CSRF FEB 2021 - Cross-Site Request Forgery FEB 2021
WordPress Security Report February 2022
Be informed about the latest Cross-Site Request Forgery FEB 2021, identified and reported publicly. As these CSRF FEB 2021 vulnerabilities have a severe negative impact on any WordPress Security, consider our FREE security AUDIT.
An estimated 2.2+ million active WordPress installations are susceptible to this attack type, considering only the publicly available numbers. The estimated number can increase by 5-10% with premium versions as they are private purchases.
Furthermore, the initial estimation can triple if we consider the already patched versions BUT NOT UPDATED by owners, as the vulnerability remains active within their domain. As these owners start changing their hosting provider (due to constant unexplained issues), they actively migrate these vulnerabilities behind protected areas, possibly exposing other clean WP to different attack types.
It is a whopping 1200% increase compared to January 2022. Read more about our previous report here: Abuse: 1 CSRF JAN 2021 – Cross-Site Request Forgery JAN 2021. The following cases made headlines just last month in the CSRF FEB 2021 category:
- Better Search < 2.5.3 - CSRF Nonce Bypass in Import/Export
- Better Search replaces the default WordPress search engine with a more powerful search engine that gives search results relevant to the title and content of the post. This means that visitors to your blog will find what they are looking for quicker than if you didn’t have Better Search installed. Active installations: 8,000+
- Contact Form 7 Style <= 3.1.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting
-
No known fix - plugin closed - Active installations: 50,000+
-
- Custom Banners < 3.3 - CSRF Nonce Bypass in saveCustomFields
- Custom Banners is a WordPress plugin that allows you to easily manage several banners (ads) and display them on the front end. Active installations: 7,000+
- eCommerce Product Catalog Plugin for WordPress < 3.0.18 - CSRF Nonce Bypass
- eCommerce Product Catalog is a beautiful, easy-to-use, 100% responsive, and free product catalog plugin for WordPress eCommerce or a simple product catalog website with a request for a quote functionality. Active installations: 10,000+
Protect your WordPress from publicly reported cases of CSRF FEB 2021 BEFORE IT'S TOO LATE! You will also protect your customers, your reputation and your online business!
- Name Directory < 1.18 - Cross-Site Request Forgery (CSRF)
- This plugin adds name/term directories (glossaries) to your WordPress installation. The output on your website is like a glossary/index, including a search function. Active installations: 3,000+
- WordPress Gallery Plugin – NextGEN Gallery < 3.5.0 - CSRF allows File Upload
- NextGEN Gallery has been the industry’s standard WordPress gallery plugin since 2007 and continues to receive over 1.5 million new downloads per year. It’s easy for simple photo galleries, but powerful enough for the most demanding photographers, visual artists, and imaging professionals. Active installations: 800,000+
- WordPress Gallery Plugin – NextGEN Gallery < 3.5.0 - CSRF allows File Upload, Stored XSS, and RCE
- NextGEN Gallery has been the industry’s standard WordPress gallery plugin since 2007 and continues to receive over 1.5 million new downloads per year. It’s easy for simple photo galleries, but powerful enough for the most demanding photographers, visual artists, and imaging professionals. Active installations: 800,000+
- Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress < 3.4.34 - CSRF to OAuth Service Disconnection
- Use Ninja Forms to create beautiful, user friendly WordPress forms that will make you feel like a professional web developer! Active installations: 1+ million
- Post SMTP Mailer/Email Log < 2.0.21 - CSRF Nonce Bypass
- Post SMTP is a next-generation WP Mail SMTP plugin, that assists in the delivery of email generated by your WordPress site. Post SMTP is the first and only plugin to support the latest security standards. With OAuth 2.0, there is no need to store your email passsword in the WordPress database where it might be found. Active installations: 200,000+
- Process Steps Template Designer < 1.3 - CSRF to Stored Cross-Site Scripting (XSS)
- Process Steps Template Designer plugin allow you to show your workflow, your software process or business process in a creative step by step responsive design template. Active installations: 4,000+
- Responsive Menu – Create Mobile-Friendly Menu < 4.0.4 - CSRF to Arbitrary File Upload
- Highly customisable Responsive Menu Plugin for WordPress. With over 150 customisable options you get a combination of 22,500 options! No coding experience or knowledge is needed with an easy to use interface you can get it looking exactly as you want with minimal fuss. Active installations: 100,000+
- Responsive Menu – Create Mobile-Friendly Menu < 4.0.4 - CSRF to Settings Update
- Highly customisable Responsive Menu Plugin for WordPress. With over 150 customisable options you get a combination of 22,500 options! No coding experience or knowledge is needed with an easy to use interface you can get it looking exactly as you want with minimal fuss. Active installations: 100,000+
- WP Private Content Plus < 3.2 - CSRF Nonce Bypass
- WP Private Content Plus simplifies the process for protecting your important WordPress site content from guests,members,specific user roles or group of selected users. This plugin supports content restrictions on posts,pages,custom post types, navigation menus,widgets and post attachments.Also the plugin allows you to hide specific content within posts and pages using a shortcode. Active installations: 8,000+
CONTACT US TODAY with any reported CSRF FEB 2021 vulnerability! Do you suspect any Cross-Site Request Forgery in your WP?
BRIEF: Cross-Site Request Forgery FEB 2021 is a type of malicious exploit of a website where unauthorised commands are submitted from a user that the web application trusts. Cross-site request forgery is also known as one-click attack, session riding, CSRF, XSRF, Sea Surf, Session Riding, Cross-Site Reference Forgery, or Hostile Linking.
What is Cross-Site Request Forgery FEB 2021?
Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partly circumvent the same-origin policy, which is designed to prevent different websites from interfering with each other. Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker’s choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state-changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
What is the impact of a CSRF FEB 2021 attack?
In a successful CSRF attack, the attacker causes the victim user to act unintentionally. Example: this might be to change the email address on their account, to change their password, or to make a funds transfer. Depending on the nature of the action, the attacker might be able to gain full control over the user’s account. If the compromised user has a privileged role within the application, then the attacker might be able to take full control of all the application’s data and functionality.
Get Healthy, Stay Healthy! A healthier online business starts today and it begins with you. Let's solve all your CSRF FEB 2021 issues.