Skip to main content

CVE-2024-10677: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown BTEV

Medium
VulnerabilityCVE-2024-10677cvecve-2024-10677cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:06:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: BTEV

Description

The BTEV WordPress plugin through 2.0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

AI-Powered Analysis

AILast updated: 07/04/2025, 06:55:39 UTC

Technical Analysis

CVE-2024-10677 is a medium-severity vulnerability classified under CWE-352, which corresponds to Cross-Site Request Forgery (CSRF). This vulnerability affects the BTEV WordPress plugin up to version 2.0.2. The core issue is the absence of CSRF protections when updating plugin settings. Specifically, the plugin does not implement any CSRF token or similar mechanism to verify that requests to change settings originate from legitimate, authenticated users. Consequently, an attacker can craft a malicious web request that, when visited by an authenticated WordPress administrator, causes unintended changes to the plugin's configuration without the admin's explicit consent. The CVSS 3.1 score is 4.3, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) shows that the attack can be performed remotely over the network, requires low attack complexity, no privileges, but does require user interaction (the admin must visit a malicious page). The impact is limited to integrity, as confidentiality and availability are not affected. No known exploits are currently in the wild, and no patches or fixes have been published yet. The vulnerability was assigned by WPScan and published in May 2025.

Potential Impact

For European organizations using WordPress sites with the BTEV plugin installed (up to version 2.0.2), this vulnerability poses a risk of unauthorized configuration changes. Since the attack requires an authenticated admin to visit a malicious page, the threat is primarily to organizations with less stringent user security awareness or where admins frequently access untrusted sites. The integrity of the plugin's settings could be compromised, potentially leading to misconfigurations that degrade site functionality or open additional attack vectors. While the vulnerability does not directly expose sensitive data or cause denial of service, altered settings could indirectly weaken security or disrupt business operations. Given the widespread use of WordPress in Europe, especially among SMEs and public sector websites, the risk is non-negligible. However, the lack of known exploits and the requirement for user interaction somewhat limit the immediate threat level.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the BTEV plugin and verify its version. Until an official patch is released, administrators should restrict access to the WordPress admin interface to trusted networks or VPNs to reduce exposure. Implementing Content Security Policy (CSP) and SameSite cookies can help mitigate CSRF risks. Educating administrators about the dangers of clicking on untrusted links while logged into WordPress is critical. Additionally, organizations can deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin's settings endpoints. Monitoring logs for unusual configuration changes and enabling multi-factor authentication (MFA) for admin accounts will further reduce risk. Once a patch is available, prompt updating is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-01T12:17:51.260Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec19d

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:55:39 AM

Last updated: 7/31/2025, 10:33:45 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats