CVE-2022-3151: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown WP Custom Cursors
The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.
AI Analysis
Technical Summary
CVE-2022-3151 is a medium-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin 'WP Custom Cursors' in versions prior to 3.0.1. The vulnerability arises because the plugin lacks proper CSRF protection when performing cursor deletion operations. Specifically, there is no verification token or similar mechanism to confirm that the deletion request originates from an authenticated and authorized user action. This flaw allows an attacker to craft a malicious web page or link that, when visited by a logged-in WordPress administrator, can trigger the deletion of arbitrary cursors without the administrator's consent or knowledge. The vulnerability requires the victim to be authenticated with administrative privileges and to interact with the attacker's crafted content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited impact (integrity loss only, no confidentiality or availability impact). No known exploits are currently reported in the wild, and no official patch links are provided in the data, though the fixed version is 3.0.1. The vulnerability does not directly compromise sensitive data or system availability but can be leveraged to manipulate the plugin's cursor configurations, potentially affecting site appearance or user experience.
Potential Impact
For European organizations using WordPress sites with the WP Custom Cursors plugin, this vulnerability poses a moderate risk primarily to site integrity and administrative control. While the direct impact is limited to deletion of cursor settings, an attacker exploiting this flaw could disrupt the user interface or branding elements, potentially undermining user trust or causing confusion. In environments where WordPress administration is tightly controlled and user sessions are well managed, the risk is reduced. However, in cases where administrators might be tricked into visiting malicious sites or where session management is lax, the vulnerability could be exploited to cause unauthorized changes. This could be particularly concerning for public-facing websites of European companies, government agencies, or e-commerce platforms relying on consistent UI/UX. Although the vulnerability does not lead to data leakage or system takeover, it could be part of a broader attack chain if combined with other vulnerabilities or social engineering tactics. The lack of known exploits suggests limited active targeting, but the presence of this vulnerability in a widely used CMS plugin means European organizations should remain vigilant.
Mitigation Recommendations
European organizations should immediately verify the version of the WP Custom Cursors plugin installed on their WordPress sites and upgrade to version 3.0.1 or later, where the CSRF protection has been implemented. If upgrading is not immediately feasible, administrators should consider disabling the plugin temporarily to eliminate the attack surface. Additionally, organizations should enforce strict administrative session management policies, including the use of multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking or unauthorized access. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attack patterns targeting cursor deletion endpoints. Educating administrators about the risks of clicking unknown links or visiting untrusted websites while logged into admin accounts can further reduce exploitation likelihood. Regular security audits and plugin vulnerability monitoring should be part of the organization's cybersecurity hygiene to promptly identify and remediate similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3151: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown WP Custom Cursors
Description
The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.
AI-Powered Analysis
Technical Analysis
CVE-2022-3151 is a medium-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin 'WP Custom Cursors' in versions prior to 3.0.1. The vulnerability arises because the plugin lacks proper CSRF protection when performing cursor deletion operations. Specifically, there is no verification token or similar mechanism to confirm that the deletion request originates from an authenticated and authorized user action. This flaw allows an attacker to craft a malicious web page or link that, when visited by a logged-in WordPress administrator, can trigger the deletion of arbitrary cursors without the administrator's consent or knowledge. The vulnerability requires the victim to be authenticated with administrative privileges and to interact with the attacker's crafted content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited impact (integrity loss only, no confidentiality or availability impact). No known exploits are currently reported in the wild, and no official patch links are provided in the data, though the fixed version is 3.0.1. The vulnerability does not directly compromise sensitive data or system availability but can be leveraged to manipulate the plugin's cursor configurations, potentially affecting site appearance or user experience.
Potential Impact
For European organizations using WordPress sites with the WP Custom Cursors plugin, this vulnerability poses a moderate risk primarily to site integrity and administrative control. While the direct impact is limited to deletion of cursor settings, an attacker exploiting this flaw could disrupt the user interface or branding elements, potentially undermining user trust or causing confusion. In environments where WordPress administration is tightly controlled and user sessions are well managed, the risk is reduced. However, in cases where administrators might be tricked into visiting malicious sites or where session management is lax, the vulnerability could be exploited to cause unauthorized changes. This could be particularly concerning for public-facing websites of European companies, government agencies, or e-commerce platforms relying on consistent UI/UX. Although the vulnerability does not lead to data leakage or system takeover, it could be part of a broader attack chain if combined with other vulnerabilities or social engineering tactics. The lack of known exploits suggests limited active targeting, but the presence of this vulnerability in a widely used CMS plugin means European organizations should remain vigilant.
Mitigation Recommendations
European organizations should immediately verify the version of the WP Custom Cursors plugin installed on their WordPress sites and upgrade to version 3.0.1 or later, where the CSRF protection has been implemented. If upgrading is not immediately feasible, administrators should consider disabling the plugin temporarily to eliminate the attack surface. Additionally, organizations should enforce strict administrative session management policies, including the use of multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking or unauthorized access. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attack patterns targeting cursor deletion endpoints. Educating administrators about the risks of clicking unknown links or visiting untrusted websites while logged into admin accounts can further reduce exploitation likelihood. Regular security audits and plugin vulnerability monitoring should be part of the organization's cybersecurity hygiene to promptly identify and remediate similar issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-09-07T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec906
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:11:49 PM
Last updated: 7/31/2025, 8:00:58 PM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.