CVE-2022-3151: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown WP Custom Cursors
The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.
AI Analysis
Technical Summary
CVE-2022-3151 is a medium-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin 'WP Custom Cursors' in versions prior to 3.0.1. The vulnerability arises because the plugin lacks proper CSRF protection when performing cursor deletion operations. Specifically, there is no verification token or similar mechanism to confirm that the deletion request originates from an authenticated and authorized user action. This flaw allows an attacker to craft a malicious web page or link that, when visited by a logged-in WordPress administrator, can trigger the deletion of arbitrary cursors without the administrator's consent or knowledge. The vulnerability requires the victim to be authenticated with administrative privileges and to interact with the attacker's crafted content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited impact (integrity loss only, no confidentiality or availability impact). No known exploits are currently reported in the wild, and no official patch links are provided in the data, though the fixed version is 3.0.1. The vulnerability does not directly compromise sensitive data or system availability but can be leveraged to manipulate the plugin's cursor configurations, potentially affecting site appearance or user experience.
Potential Impact
For European organizations using WordPress sites with the WP Custom Cursors plugin, this vulnerability poses a moderate risk primarily to site integrity and administrative control. While the direct impact is limited to deletion of cursor settings, an attacker exploiting this flaw could disrupt the user interface or branding elements, potentially undermining user trust or causing confusion. In environments where WordPress administration is tightly controlled and user sessions are well managed, the risk is reduced. However, in cases where administrators might be tricked into visiting malicious sites or where session management is lax, the vulnerability could be exploited to cause unauthorized changes. This could be particularly concerning for public-facing websites of European companies, government agencies, or e-commerce platforms relying on consistent UI/UX. Although the vulnerability does not lead to data leakage or system takeover, it could be part of a broader attack chain if combined with other vulnerabilities or social engineering tactics. The lack of known exploits suggests limited active targeting, but the presence of this vulnerability in a widely used CMS plugin means European organizations should remain vigilant.
Mitigation Recommendations
European organizations should immediately verify the version of the WP Custom Cursors plugin installed on their WordPress sites and upgrade to version 3.0.1 or later, where the CSRF protection has been implemented. If upgrading is not immediately feasible, administrators should consider disabling the plugin temporarily to eliminate the attack surface. Additionally, organizations should enforce strict administrative session management policies, including the use of multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking or unauthorized access. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attack patterns targeting cursor deletion endpoints. Educating administrators about the risks of clicking unknown links or visiting untrusted websites while logged into admin accounts can further reduce exploitation likelihood. Regular security audits and plugin vulnerability monitoring should be part of the organization's cybersecurity hygiene to promptly identify and remediate similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3151: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown WP Custom Cursors
Description
The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when deleting cursors, which could allow attackers to made a logged in admin delete arbitrary cursors via a CSRF attack.
AI-Powered Analysis
Technical Analysis
CVE-2022-3151 is a medium-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin 'WP Custom Cursors' in versions prior to 3.0.1. The vulnerability arises because the plugin lacks proper CSRF protection when performing cursor deletion operations. Specifically, there is no verification token or similar mechanism to confirm that the deletion request originates from an authenticated and authorized user action. This flaw allows an attacker to craft a malicious web page or link that, when visited by a logged-in WordPress administrator, can trigger the deletion of arbitrary cursors without the administrator's consent or knowledge. The vulnerability requires the victim to be authenticated with administrative privileges and to interact with the attacker's crafted content (user interaction). The CVSS v3.1 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required for the attacker, but requiring user interaction and resulting in limited impact (integrity loss only, no confidentiality or availability impact). No known exploits are currently reported in the wild, and no official patch links are provided in the data, though the fixed version is 3.0.1. The vulnerability does not directly compromise sensitive data or system availability but can be leveraged to manipulate the plugin's cursor configurations, potentially affecting site appearance or user experience.
Potential Impact
For European organizations using WordPress sites with the WP Custom Cursors plugin, this vulnerability poses a moderate risk primarily to site integrity and administrative control. While the direct impact is limited to deletion of cursor settings, an attacker exploiting this flaw could disrupt the user interface or branding elements, potentially undermining user trust or causing confusion. In environments where WordPress administration is tightly controlled and user sessions are well managed, the risk is reduced. However, in cases where administrators might be tricked into visiting malicious sites or where session management is lax, the vulnerability could be exploited to cause unauthorized changes. This could be particularly concerning for public-facing websites of European companies, government agencies, or e-commerce platforms relying on consistent UI/UX. Although the vulnerability does not lead to data leakage or system takeover, it could be part of a broader attack chain if combined with other vulnerabilities or social engineering tactics. The lack of known exploits suggests limited active targeting, but the presence of this vulnerability in a widely used CMS plugin means European organizations should remain vigilant.
Mitigation Recommendations
European organizations should immediately verify the version of the WP Custom Cursors plugin installed on their WordPress sites and upgrade to version 3.0.1 or later, where the CSRF protection has been implemented. If upgrading is not immediately feasible, administrators should consider disabling the plugin temporarily to eliminate the attack surface. Additionally, organizations should enforce strict administrative session management policies, including the use of multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking or unauthorized access. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attack patterns targeting cursor deletion endpoints. Educating administrators about the risks of clicking unknown links or visiting untrusted websites while logged into admin accounts can further reduce exploitation likelihood. Regular security audits and plugin vulnerability monitoring should be part of the organization's cybersecurity hygiene to promptly identify and remediate similar issues.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-09-07T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec906
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 2:11:49 PM
Last updated: 2/4/2026, 4:42:27 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20123: URL Redirection to Untrusted Site ('Open Redirect') in Cisco Cisco Evolved Programmable Network Manager (EPNM)
MediumCVE-2026-20119: Improper Validation of Specified Type of Input in Cisco Cisco RoomOS Software
HighCVE-2026-20111: Use of Hard-coded Credentials in Cisco Cisco Prime Infrastructure
MediumCVE-2026-20098: Unrestricted Upload of File with Dangerous Type in Cisco Cisco Meeting Management
HighCVE-2026-20056: Download of Code Without Integrity Check in Cisco Cisco Secure Web Appliance
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.