Skip to main content

CVE-2022-3899: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown 3dprint

High
VulnerabilityCVE-2022-3899cvecve-2022-3899cwe-352
Published: Tue Jan 16 2024 (01/16/2024, 15:50:51 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: 3dprint

Description

The 3dprint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will delete any number of files or directories on the target server by tricking a logged in admin into submitting a form.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:26:56 UTC

Technical Analysis

CVE-2022-3899 is a high-severity vulnerability affecting the 3dprint WordPress plugin versions prior to 3.5.6.9. The vulnerability arises from the plugin's inclusion of a modified version of Tiny File Manager that lacks proper protection against Cross-Site Request Forgery (CSRF) attacks. Specifically, this flaw allows an attacker to craft a malicious request that, when executed by a logged-in administrator, can delete arbitrary files or directories on the target server. The attack vector requires the victim to be authenticated as an admin and to interact with the malicious content (e.g., by submitting a form). The vulnerability is classified under CWE-352 (Cross-Site Request Forgery), which involves unauthorized commands being transmitted from a user that the web application trusts. The CVSS v3.1 base score is 8.1, indicating a high severity level, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H. This means the attack can be performed remotely over the network without privileges but requires user interaction, and it impacts the integrity and availability of the system by allowing deletion of files, though confidentiality is not affected. No known exploits are currently reported in the wild, and no official patches or updates are linked in the provided data, though upgrading to version 3.5.6.9 or later is implied as a fix. The vulnerability is significant because it targets administrative functionality, potentially leading to severe disruption or data loss on affected WordPress sites using this plugin.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress sites with the 3dprint plugin installed. Successful exploitation could lead to deletion of critical files or directories, resulting in website downtime, loss of data, and disruption of business operations. This could affect e-commerce platforms, corporate websites, or any service relying on the affected plugin. The integrity and availability of web assets are compromised, potentially causing reputational damage and financial losses. Additionally, recovery efforts might require restoring from backups and applying security patches, incurring operational costs. Since the attack requires an authenticated admin user to interact with a malicious request, social engineering or phishing campaigns could be used to facilitate exploitation. The lack of confidentiality impact reduces the risk of data leakage but does not diminish the severity of operational disruption. Organizations in sectors with high reliance on web presence, such as retail, media, and public services, could face significant challenges if targeted.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately verify if the 3dprint WordPress plugin is installed and identify its version. 2) Upgrade the plugin to version 3.5.6.9 or later, where the CSRF protection issue is addressed. 3) If an upgrade is not immediately possible, implement web application firewall (WAF) rules to detect and block suspicious requests targeting the Tiny File Manager endpoints or unusual file deletion requests. 4) Educate administrators and privileged users about the risk of CSRF attacks and the importance of avoiding clicking on untrusted links or submitting forms from unknown sources while logged in. 5) Limit administrative access to trusted networks or use multi-factor authentication (MFA) to reduce the risk of compromised admin sessions. 6) Regularly back up website files and databases to enable quick recovery in case of file deletion. 7) Monitor server logs for unusual file deletion activities or requests that could indicate exploitation attempts. 8) Consider isolating or removing the Tiny File Manager component if it is not essential to reduce the attack surface. These measures go beyond generic advice by focusing on immediate plugin management, user awareness, and proactive detection tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-08T17:54:51.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a04e8

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:26:56 PM

Last updated: 7/26/2025, 7:27:42 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats