CVE-2023-3720: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Upload Media By URL
The Upload Media By URL WordPress plugin before 1.0.8 does not have CSRF check when uploading files, which could allow attackers to make logged in admins upload files (including HTML containing JS code for users with the unfiltered_html capability) on their behalf.
AI Analysis
Technical Summary
CVE-2023-3720 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Upload Media By URL' in versions prior to 1.0.8. The vulnerability arises because the plugin lacks proper CSRF protection when handling file uploads via URL. This security flaw allows an attacker to craft a malicious web request that, when visited by a logged-in WordPress administrator, can cause the admin's browser to upload arbitrary files to the website without their consent. Notably, if the uploaded files contain HTML with embedded JavaScript, and the targeted admin has the 'unfiltered_html' capability (which permits posting unfiltered HTML content), the attacker can execute stored Cross-Site Scripting (XSS) attacks. This can lead to the injection and execution of malicious scripts in the context of the WordPress site, potentially compromising site integrity and user data. The vulnerability does not require prior authentication (PR:N) but does require user interaction (UI:R), meaning the attacker must trick an authenticated admin into visiting a malicious page. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in high impact on integrity without affecting confidentiality or availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is categorized under CWE-352 (CSRF) and CWE-79 (XSS), highlighting the combined risk of unauthorized request forgery and script injection. This vulnerability is significant because it targets administrative users who have elevated privileges, and exploitation could lead to persistent compromise of the WordPress site, including defacement, data manipulation, or further malware deployment.
Potential Impact
For European organizations using WordPress sites with the 'Upload Media By URL' plugin, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to upload malicious files or scripts, potentially leading to site defacement, unauthorized content injection, or further compromise of site visitors through XSS attacks. This can damage organizational reputation, lead to data integrity issues, and potentially expose users to phishing or malware. Since many European businesses and public sector entities rely on WordPress for their web presence, especially small to medium enterprises and local government sites, the impact could be widespread if the plugin is in use. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity impact means attackers could manipulate site content or functionality. Additionally, the requirement for an admin to be logged in and visit a malicious page limits the attack surface but does not eliminate risk, especially in environments where admins may be targeted via phishing or social engineering. The absence of known exploits reduces immediate threat but vigilance is necessary as exploit code could emerge. Compliance with European data protection regulations (e.g., GDPR) may be indirectly affected if site integrity is compromised leading to user data misuse or loss of trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'Upload Media By URL' plugin is installed and determine its version. If the plugin is present and running a version prior to 1.0.8, organizations should disable or remove the plugin until a patched version is available. In the absence of an official patch, administrators can implement manual CSRF protections by adding nonce verification to the upload handling code or restricting upload capabilities to trusted IPs or user roles. Additionally, organizations should enforce the principle of least privilege by limiting the 'unfiltered_html' capability to only the most trusted administrators. Regular security awareness training should be conducted to reduce the risk of admins falling victim to social engineering or phishing attempts that could trigger the CSRF attack. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the upload functionality. Monitoring logs for unusual upload activity or unexpected file additions can help detect exploitation attempts early. Finally, organizations should keep their WordPress core, themes, and plugins updated and subscribe to vulnerability advisories to respond promptly to new patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-3720: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Upload Media By URL
Description
The Upload Media By URL WordPress plugin before 1.0.8 does not have CSRF check when uploading files, which could allow attackers to make logged in admins upload files (including HTML containing JS code for users with the unfiltered_html capability) on their behalf.
AI-Powered Analysis
Technical Analysis
CVE-2023-3720 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the WordPress plugin 'Upload Media By URL' in versions prior to 1.0.8. The vulnerability arises because the plugin lacks proper CSRF protection when handling file uploads via URL. This security flaw allows an attacker to craft a malicious web request that, when visited by a logged-in WordPress administrator, can cause the admin's browser to upload arbitrary files to the website without their consent. Notably, if the uploaded files contain HTML with embedded JavaScript, and the targeted admin has the 'unfiltered_html' capability (which permits posting unfiltered HTML content), the attacker can execute stored Cross-Site Scripting (XSS) attacks. This can lead to the injection and execution of malicious scripts in the context of the WordPress site, potentially compromising site integrity and user data. The vulnerability does not require prior authentication (PR:N) but does require user interaction (UI:R), meaning the attacker must trick an authenticated admin into visiting a malicious page. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in high impact on integrity without affecting confidentiality or availability. There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability is categorized under CWE-352 (CSRF) and CWE-79 (XSS), highlighting the combined risk of unauthorized request forgery and script injection. This vulnerability is significant because it targets administrative users who have elevated privileges, and exploitation could lead to persistent compromise of the WordPress site, including defacement, data manipulation, or further malware deployment.
Potential Impact
For European organizations using WordPress sites with the 'Upload Media By URL' plugin, this vulnerability poses a moderate risk. Successful exploitation could allow attackers to upload malicious files or scripts, potentially leading to site defacement, unauthorized content injection, or further compromise of site visitors through XSS attacks. This can damage organizational reputation, lead to data integrity issues, and potentially expose users to phishing or malware. Since many European businesses and public sector entities rely on WordPress for their web presence, especially small to medium enterprises and local government sites, the impact could be widespread if the plugin is in use. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity impact means attackers could manipulate site content or functionality. Additionally, the requirement for an admin to be logged in and visit a malicious page limits the attack surface but does not eliminate risk, especially in environments where admins may be targeted via phishing or social engineering. The absence of known exploits reduces immediate threat but vigilance is necessary as exploit code could emerge. Compliance with European data protection regulations (e.g., GDPR) may be indirectly affected if site integrity is compromised leading to user data misuse or loss of trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'Upload Media By URL' plugin is installed and determine its version. If the plugin is present and running a version prior to 1.0.8, organizations should disable or remove the plugin until a patched version is available. In the absence of an official patch, administrators can implement manual CSRF protections by adding nonce verification to the upload handling code or restricting upload capabilities to trusted IPs or user roles. Additionally, organizations should enforce the principle of least privilege by limiting the 'unfiltered_html' capability to only the most trusted administrators. Regular security awareness training should be conducted to reduce the risk of admins falling victim to social engineering or phishing attempts that could trigger the CSRF attack. Web Application Firewalls (WAFs) can be configured to detect and block suspicious POST requests targeting the upload functionality. Monitoring logs for unusual upload activity or unexpected file additions can help detect exploitation attempts early. Finally, organizations should keep their WordPress core, themes, and plugins updated and subscribe to vulnerability advisories to respond promptly to new patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-17T17:38:35.876Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcc59
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 2:10:47 AM
Last updated: 7/28/2025, 8:45:21 PM
Views: 12
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.