Skip to main content

CVE-2023-2334: CWE-79 Cross-Site Scripting (XSS) in Unknown edd-google-sheet-connector-pro

Medium
VulnerabilityCVE-2023-2334cvecve-2023-2334cwe-79cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:08:56 UTC)
Source: CVE
Vendor/Project: Unknown
Product: edd-google-sheet-connector-pro

Description

The edd-google-sheet-connector-pro WordPress plugin before 1.4, Easy Digital Downloads Google Sheet Connector WordPress plugin before 1.6.6 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack

AI-Powered Analysis

AILast updated: 07/04/2025, 16:25:37 UTC

Technical Analysis

CVE-2023-2334 is a medium-severity vulnerability affecting the edd-google-sheet-connector-pro WordPress plugin, specifically versions prior to 1.4 and Easy Digital Downloads Google Sheet Connector WordPress plugin versions before 1.6.6. The vulnerability arises due to the absence of Cross-Site Request Forgery (CSRF) protections when updating the plugin's Access Code. This flaw allows an attacker to craft a malicious request that, when executed by a logged-in administrator, can change the Access Code to an arbitrary value chosen by the attacker. The vulnerability is linked to CWE-79 (Cross-Site Scripting) and CWE-352 (Cross-Site Request Forgery), indicating that the attack vector involves tricking an authenticated user into submitting a forged request, potentially combined with script injection techniques. The CVSS 3.1 base score of 5.4 reflects a medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (logged-in admin), and user interaction (the admin must be tricked into submitting the request). The impact affects confidentiality and integrity but not availability, and the scope is changed, meaning the vulnerability could affect resources beyond the vulnerable component. No known exploits are currently reported in the wild. The plugin integrates WordPress with Google Sheets, likely to automate data synchronization or export, making the Access Code a sensitive credential for API access. Unauthorized modification of this code could lead to unauthorized data access or manipulation via the Google Sheets API, potentially exposing sensitive business or customer data or corrupting data flows.

Potential Impact

For European organizations using the edd-google-sheet-connector-pro plugin, this vulnerability poses a risk to the confidentiality and integrity of data exchanged between their WordPress sites and Google Sheets. Attackers exploiting this flaw could alter the Access Code, enabling unauthorized access to linked Google Sheets, which may contain sensitive financial, customer, or operational data. This could lead to data leakage, unauthorized data manipulation, or disruption of business processes relying on accurate data synchronization. Since the attack requires an authenticated administrator to be tricked into submitting a malicious request, organizations with less stringent administrative access controls or insufficient user awareness training are at higher risk. The impact is particularly relevant for e-commerce or digital sales platforms using Easy Digital Downloads in Europe, where GDPR compliance mandates strict data protection. Unauthorized access or data alteration could result in regulatory penalties and reputational damage. Additionally, the vulnerability could be leveraged as part of a broader attack chain to escalate privileges or move laterally within the network if combined with other vulnerabilities.

Mitigation Recommendations

1. Immediate upgrade to the latest version of the edd-google-sheet-connector-pro plugin that includes CSRF protections when updating the Access Code. If an official patch is not yet available, temporarily disable the plugin or restrict administrative access to trusted personnel only. 2. Implement strict administrative access controls in WordPress, including limiting the number of users with admin privileges and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 3. Conduct user awareness training for administrators to recognize and avoid phishing or social engineering attempts that could trigger CSRF attacks. 4. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attack patterns targeting WordPress admin endpoints. 5. Regularly audit and monitor logs for unusual changes to plugin settings or Access Codes, enabling rapid detection and response to unauthorized modifications. 6. Review and restrict the scope of API credentials and Access Codes used by the plugin to minimize potential damage if compromised, following the principle of least privilege. 7. Maintain up-to-date backups of WordPress configurations and Google Sheets data to enable recovery in case of data corruption or unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-04-27T09:33:47.962Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebaa1

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:25:37 PM

Last updated: 8/12/2025, 10:42:51 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats