Skip to main content

CVE-2023-5934: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Travelpayouts: All Travel Brands in One Place

High
VulnerabilityCVE-2023-5934cvecve-2023-5934cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:09:02 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Travelpayouts: All Travel Brands in One Place

Description

The Travelpayouts: All Travel Brands in One Place WordPress plugin before 1.1.13 does not have CSRF check in place when importing settings from the v1, which could allow attackers to make a logged in admin update some settings via a CSRF attack

AI-Powered Analysis

AILast updated: 07/06/2025, 07:41:08 UTC

Technical Analysis

CVE-2023-5934 is a high-severity vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WordPress plugin "Travelpayouts: All Travel Brands in One Place" prior to version 1.1.13. The vulnerability arises because the plugin lacks proper CSRF protections when importing settings from version 1. This absence of a CSRF token or similar verification mechanism allows an attacker to craft malicious requests that, when executed by an authenticated administrator, can alter plugin settings without the admin's consent or knowledge. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), indicating that an attacker can exploit it remotely without authentication or user action, which is unusual for CSRF but likely reflects the context of the plugin's functionality and WordPress session management. The impact includes potential confidentiality, integrity, and availability loss, as unauthorized changes to plugin settings could disrupt functionality, leak sensitive configuration data, or enable further exploitation. The CVSS score of 7.3 (high) reflects these risks. No known exploits are currently reported in the wild, and no official patches are linked, but upgrading to version 1.1.13 or later is implied as a remediation step. This vulnerability is significant because WordPress plugins are widely used and often have administrative interfaces accessible via web browsers, making CSRF a common attack vector if protections are missing.

Potential Impact

For European organizations using the Travelpayouts WordPress plugin, this vulnerability poses a risk of unauthorized configuration changes that could disrupt travel-related services or lead to data leakage. Given the plugin's role in aggregating travel brands, attackers could manipulate settings to redirect users to malicious sites, degrade service availability, or expose sensitive affiliate or API credentials. This could damage business reputation, cause financial losses, and violate data protection regulations such as GDPR if personal data is compromised. The ease of exploitation without authentication increases the threat level, especially for organizations with multiple administrators or less stringent session management. The impact is particularly relevant for European travel agencies, tourism boards, and related service providers relying on WordPress for their online presence.

Mitigation Recommendations

European organizations should immediately verify their use of the Travelpayouts plugin and upgrade to version 1.1.13 or later where CSRF protections are implemented. If upgrading is not immediately possible, administrators should restrict access to the WordPress admin interface via IP whitelisting or VPNs to reduce exposure. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide interim protection. Additionally, organizations should enforce strong session management policies, including short session timeouts and multi-factor authentication for admin accounts, to limit the window of opportunity for exploitation. Regular audits of plugin settings and logs can help detect unauthorized changes early. Finally, monitoring for updates from the plugin vendor and applying patches promptly is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-11-02T15:13:43.425Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebab2

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/6/2025, 7:41:08 AM

Last updated: 7/31/2025, 8:55:55 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats