Skip to main content

CVE-2022-3151: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown WP Custom Cursors

Medium
VulnerabilityCVE-2022-3151cvecve-2022-3151cwe-352
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Custom Cursors

Description

The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:11:49 UTC

Technical Analysis

CVE-2022-3151 is a medium-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin 'WP Custom Cursors' in versions prior to 3.0.1. The vulnerability arises because the plugin lacks proper CSRF protection when performing cursor deletion operations. Specifically, there is no verification token or similar mechanism to confirm that the deletion request originates from an authenticated and authorized user action. This flaw allows an attacker to craft a malicious web page or link that, when visited by a logged-in WordPress administrator, can trigger the deletion of arbitrary cursors without the administrator's consent or knowledge. The vulnerability requires the victim to be authenticated with administrative privileges and to interact with the attacker's crafted content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited impact (integrity loss only, no confidentiality or availability impact). No known exploits are currently reported in the wild, and no official patch links are provided in the data, though the fixed version is 3.0.1. The vulnerability does not directly compromise sensitive data or system availability but can be leveraged to manipulate the plugin's cursor configurations, potentially affecting site appearance or user experience.

Potential Impact

For European organizations using WordPress sites with the WP Custom Cursors plugin, this vulnerability poses a moderate risk primarily to site integrity and administrative control. While the direct impact is limited to deletion of cursor settings, an attacker exploiting this flaw could disrupt the user interface or branding elements, potentially undermining user trust or causing confusion. In environments where WordPress administration is tightly controlled and user sessions are well managed, the risk is reduced. However, in cases where administrators might be tricked into visiting malicious sites or where session management is lax, the vulnerability could be exploited to cause unauthorized changes. This could be particularly concerning for public-facing websites of European companies, government agencies, or e-commerce platforms relying on consistent UI/UX. Although the vulnerability does not lead to data leakage or system takeover, it could be part of a broader attack chain if combined with other vulnerabilities or social engineering tactics. The lack of known exploits suggests limited active targeting, but the presence of this vulnerability in a widely used CMS plugin means European organizations should remain vigilant.

Mitigation Recommendations

European organizations should immediately verify the version of the WP Custom Cursors plugin installed on their WordPress sites and upgrade to version 3.0.1 or later, where the CSRF protection has been implemented. If upgrading is not immediately feasible, administrators should consider disabling the plugin temporarily to eliminate the attack surface. Additionally, organizations should enforce strict administrative session management policies, including the use of multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking or unauthorized access. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attack patterns targeting cursor deletion endpoints. Educating administrators about the risks of clicking unknown links or visiting untrusted websites while logged into admin accounts can further reduce exploitation likelihood. Regular security audits and plugin vulnerability monitoring should be part of the organization's cybersecurity hygiene to promptly identify and remediate similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec906

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:11:49 PM

Last updated: 7/31/2025, 8:00:58 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats