Skip to main content

CVE-2024-11373: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Connexion Logs

Medium
VulnerabilityCVE-2024-11373cvecve-2024-11373cwe-352
Published: Thu May 15 2025 (05/15/2025, 20:06:49 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Connexion Logs

Description

The Connexion Logs WordPress plugin through 3.0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

AI-Powered Analysis

AILast updated: 07/04/2025, 06:58:03 UTC

Technical Analysis

CVE-2024-11373 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Connexion Logs WordPress plugin up to version 3.0.2. The vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. This means that an attacker can craft a malicious web request that, if visited by an authenticated WordPress administrator, could cause the admin's browser to unknowingly submit a request that changes the plugin's configuration. The vulnerability does not require the attacker to have any privileges or direct access to the target system; however, it does require the victim to be logged in as an administrator and to interact with the malicious content (e.g., visiting a crafted URL or webpage). The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based with low complexity, no privileges required, but user interaction is necessary. The impact is limited to integrity, as confidentiality and availability are not affected. There are no known exploits in the wild, and no patches or mitigations have been officially published at the time of this report. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. Given the widespread use of WordPress and its plugins, this vulnerability could be leveraged to alter plugin settings, potentially enabling further exploitation or weakening site security configurations indirectly.

Potential Impact

For European organizations using WordPress sites with the Connexion Logs plugin, this vulnerability could lead to unauthorized changes in plugin settings by attackers exploiting CSRF. Although the direct impact is limited to integrity (modification of plugin settings), this can have cascading effects such as disabling security logging, altering logging parameters, or enabling features that facilitate further attacks or data tampering. Organizations relying on these logs for security monitoring and incident response may find their ability to detect malicious activity impaired. Since the attack requires an authenticated administrator to interact with malicious content, the risk is higher in environments where administrators frequently access untrusted websites or emails. The impact is particularly relevant for sectors with strict compliance requirements around data integrity and audit trails, such as finance, healthcare, and government entities in Europe. Disruption or manipulation of logging can undermine forensic investigations and regulatory compliance, potentially leading to reputational damage and legal consequences.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately audit all WordPress sites to identify installations of the Connexion Logs plugin and determine the version in use. 2) Restrict administrator access to trusted networks and educate administrators about the risks of interacting with untrusted websites or emails while logged into WordPress admin panels. 3) Implement Web Application Firewall (WAF) rules that detect and block suspicious POST requests to the plugin's settings endpoints, especially those lacking proper CSRF tokens or originating from external referrers. 4) If possible, temporarily disable the Connexion Logs plugin until a patch or update is available. 5) Monitor administrative actions and plugin configuration changes closely through logs and alerts to detect any unauthorized modifications. 6) Encourage plugin developers or the community to release a patch that implements proper CSRF token validation on all state-changing requests. 7) Apply Content Security Policy (CSP) headers to reduce the risk of malicious cross-site requests. These measures go beyond generic advice by focusing on immediate detection, access control, and compensating controls until a fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-11-18T19:30:50.522Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec1bc

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:58:03 AM

Last updated: 8/15/2025, 9:53:09 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats