Skip to main content

CVE-2022-1749: CWE-352 Cross-Site Request Forgery (CSRF) in createplugin WPMK Ajax Finder

High
VulnerabilityCVE-2022-1749cvecve-2022-1749cwe-352
Published: Mon Jun 13 2022 (06/13/2022, 13:13:21 UTC)
Source: CVE
Vendor/Project: createplugin
Product: WPMK Ajax Finder

Description

The WPMK Ajax Finder WordPress plugin is vulnerable to Cross-Site Request Forgery via the createplugin_atf_admin_setting_page() function found in the ~/inc/config/create-plugin-config.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.

AI-Powered Analysis

AILast updated: 07/05/2025, 21:42:24 UTC

Technical Analysis

CVE-2022-1749 is a high-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) affecting the WPMK Ajax Finder WordPress plugin, specifically versions up to and including 1.0.1. The vulnerability arises from the createplugin_atf_admin_setting_page() function located in the ~/inc/config/create-plugin-config.php file, which lacks a proper nonce check. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. The absence of this nonce validation allows attackers to craft malicious web requests that, when executed by an authenticated administrator or user with sufficient privileges, can inject arbitrary web scripts or perform unauthorized actions on the site. The CVSS v3.1 base score of 8.8 reflects the critical nature of this vulnerability, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requiring user interaction (the victim must be tricked into visiting a malicious link or page). The impact metrics indicate high confidentiality, integrity, and availability impacts, meaning an attacker could potentially steal sensitive data, modify site content or configurations, and disrupt site operations. Although no known exploits have been reported in the wild, the vulnerability's characteristics make it a significant risk for WordPress sites using this plugin. Since the plugin is designed to enhance search functionality via Ajax, it is likely installed on a variety of WordPress sites, increasing the potential attack surface. The lack of a patch or official fix at the time of reporting further elevates the risk.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the WPMK Ajax Finder plugin installed. Successful exploitation could lead to unauthorized administrative actions, data theft, defacement, or service disruption. This can result in reputational damage, loss of customer trust, and potential regulatory penalties under GDPR if personal data is compromised. The high integrity and availability impacts mean that attackers could alter website content or configurations, potentially injecting malicious code that could spread malware to visitors or redirect users to phishing sites. Additionally, disruption of website services could affect business operations, particularly for e-commerce or customer-facing portals. Given the widespread use of WordPress in Europe for both commercial and governmental websites, the vulnerability could be leveraged in targeted attacks against organizations with valuable data or high-profile web presence. The requirement for user interaction (an authenticated user visiting a malicious link) means social engineering could be used to facilitate exploitation, increasing the threat vector.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the WPMK Ajax Finder plugin, particularly versions up to 1.0.1. If found, the plugin should be disabled or removed until an official patch is released. In the absence of a vendor patch, site administrators can implement manual nonce checks in the createplugin_atf_admin_setting_page() function to validate requests properly. Additionally, organizations should enforce strict user access controls, limiting administrative privileges to trusted personnel only and educating users about the risks of clicking on suspicious links. Employing Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting this plugin can provide a temporary protective layer. Regular monitoring of web server logs for unusual POST requests to the affected plugin endpoints can help detect attempted exploitation. Finally, maintaining up-to-date backups and having an incident response plan will aid in rapid recovery if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2022-05-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdbcd3

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/5/2025, 9:42:24 PM

Last updated: 8/4/2025, 6:44:10 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats