CSRF JAN 2022 – Cross-Site Request Forgery JAN 2022
Tailored WordPress Security Report
Be informed about the latest Cross-Site Request Forgery JAN 2022, identified and reported publicly. As these CSRF JAN 2022 vulnerabilities have a severe negative impact on any WordPress Security, consider our FREE security consulting.
An estimated 533.300+ active WordPress installations are susceptible to this attack type, considering only the publicly available numbers. It is a mind-boggling 250% increase compared to last month. The estimated number can increase by 5-10% with premium versions as they are private purchases.
Furthermore, the initial estimation can triple if we consider the already patched versions BUT NOT UPDATED by owners, as the vulnerability remains active within their domain. As these owners start changing their hosting provider (due to constant unexplained issues), they actively migrate these vulnerabilities behind protected areas, possibly exposing other clean WP to different attack types.
- Kudos Donations – Easy donations and payments with Mollie – Arbitrary Items Deletion via CSRF
- Kudos Donations allows you to add a donate button anywhere on your website. Once a user clicks this button they will be greeted with a pop-up window where they can enter their details and how much they would like to donate. Active installations: 30+
- Stetic – CSRF to Stored Cross-Site Scripting (XSS)
- Use the popular Stetic Web Analytics on your WordPress blog. Just enter your project token and api key and the Stetic tracking code will be automaticly be added to your site. Now you can watch your stats on the wordpress dashboard and on the Stetic plugin statistics page. Active installations: 300+
- Contact Form With Captcha – CSRF to Stored Cross-Site Scripting (XSS)
- This plugin has been closed as of November 26, 2021 and is not available for download. This closure is temporary, pending a full review.
- Affiliate Ads for ClickBank – CSRF to Stored Cross-Site Scripting (XSS)
- Affiliate Ads for ClickBank – Stored Cross-Site Scripting (XSS)
- This plugin has been closed as of December 1, 2021 and is not available for download. This closure is temporary, pending a full review.
- Modal Window – create popup modal window – RFI leading to RCE via CSRF
- Use the free WordPress popup plugin “Modal Window” to quickly and easily create informative popups. Add the text and media you need, insert shortcodes of forms and much more. Change the behavior of the display of modal windows depending on the user’s actions on the page. Active installations: 10,000+
- WP Coder – add custom html, css and js code – RFI leading to RCE via CSRF
- WP Coder – plugin for adding custom code to the site. You can easily add HTML CSS JS code to the page of your site. This plugin is great for placing a connection of various scripts or styles to make the site more beautiful, dynamic and attractive. Active installations: 10,000+
- Button Generator – easily Button Builder – RFI leading to RCE via CSRF
- Button Generator – the simple and functional WordPress plugin for creating buttons. With the button builder plugin, you can easily create standard and floating button with icon for your own needs as you wish and then insert anywhere place on the site. Use analytics for each button for reach marketing targets. Active installations: 5,000+
- Crisp Live Chat – CSRF to Stored Cross-Site Scripting (XSS)
- Crisp Live Chat is a free and beautiful chat for your website. This is the ultimate free Live Chat plugin for WordPress if you want to grow your email list, generate leads, and enhance your customer relationship within the same software. Active installations: 30,000+
- Contact Form 7 Database Addon – CFDB7 – Arbitrary Form Deletion via CSRF
- Contact Form 7 Database Addon – CFDB7 – Unauthenticated Stored Cross-Site Scripting
- The “CFDB7” plugin saves contact form 7 submissions to your WordPress database. Export the data to a CSV file. By simply installing the plugin, it will automatically begin to capture form submissions from contact form 7. Active installations: 400,000+
- Accept Donations with PayPal – Arbitrary Post Deletion via CSRF
- You can place a PayPal Donation button anywhere on your site where you want to collect money. Your customers can use their PayPal account or Credit Card to donate money to you. Active installations: 30,000+
- Simple Download Monitor – Multiple CSRF
- I developed the Simple Download Monitor plugin because I needed a nice way to manage my digital downloads and monitor the number of downloads of my files and documents. Active installations: 30,000+
- WP125 – Arbitrary Ad Deletion via CSRF
- If you’ve given up the low-paying and slightly obtrusive ad networks used by many new bloggers, in favor of selling ads directly, you may have been frustrated with the excessive time involved managing your ads. Not only do you have to find advertisers to sponsor your blog, you have to manually edit your template to put the ad in, and then head over to your favorite calendar app to set an alert to remind you when to take the ad down. Active installations: 10,000+
- tarteaucitron.js – Cookies legislation & GDPR – CSRF to Stored Cross-Site Scripting
- tarteaucitron.js – Cookies legislation & GDPR – Stored Cross-Site Scripting
- tarteaucitron.js is the most used script to get in compliance with cookies and GDPR. Active installations: 7,000+
- Spreadsheet Integration – Automate Google Sheets With WordPress, WooCommerce & Most Popular Form Plugins. – CSRF Bypass
- Spreadsheet Integration – Automate Google Sheets With WordPress, WooCommerce & Most Popular Form Plugins. – Reflected Cross-Site Scripting
- WordPress Google Sheets Integration, Connects WordPress events and its most popular plugin with Google Spreadsheet via Google API and Service Account. Active installations: 1,000+
BRIEF: Cross-Site Request Forgery JAN 2022 is a type of malicious exploit of a website where unauthorised commands are submitted from a user that the web application trusts. Cross-site request forgery is also known as one-click attack, session riding, CSRF, XSRF, Sea Surf, Session Riding, Cross-Site Reference Forgery, or Hostile Linking.
What is Cross-Site Request Forgery JAN 2022?
Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partly circumvent the same-origin policy, which is designed to prevent different websites from interfering with each other. Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker’s choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state-changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
What is the impact of a CSRF JAN 2022 attack?
In a successful CSRF attack, the attacker causes the victim user to act unintentionally. Example: this might be to change the email address on their account, to change their password, or to make a funds transfer. Depending on the nature of the action, the attacker might be able to gain full control over the user’s account. If the compromised user has a privileged role within the application, then the attacker might be able to take full control of all the application’s data and functionality.