Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13336: CWE-352 Cross-Site Request Forgery (CSRF) in exeebit Disable Auto Updates

0
Medium
VulnerabilityCVE-2024-13336cvecve-2024-13336cwe-352
Published: Wed Feb 19 2025 (02/19/2025, 08:21:46 UTC)
Source: CVE Database V5
Vendor/Project: exeebit
Product: Disable Auto Updates

Description

CVE-2024-13336 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Disable Auto Updates WordPress plugin by exeebit, versions up to and including 1. 4. The vulnerability arises from missing or incorrect nonce validation on the 'disable-auto-updates' admin page, allowing unauthenticated attackers to trick site administrators into disabling all automatic updates via a forged request. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of the update mechanism but does not affect confidentiality or availability directly. No known exploits are currently reported in the wild. The CVSS 3. 1 base score is 4. 3, indicating medium severity. Organizations using this plugin should prioritize patching or implementing mitigations to prevent unauthorized disabling of auto updates, which could increase exposure to other vulnerabilities.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:01:48 UTC

Technical Analysis

CVE-2024-13336 is a medium severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Disable Auto Updates plugin for WordPress, developed by exeebit. This plugin is designed to disable automatic updates in WordPress installations. The vulnerability exists because the plugin's 'disable-auto-updates' administrative page lacks proper nonce validation, a security mechanism used to verify the legitimacy of requests. Without this protection, an attacker can craft a malicious request that, when executed by an authenticated administrator (e.g., by clicking a specially crafted link), disables all automatic updates on the WordPress site. This CSRF attack does not require the attacker to be authenticated but does require the administrator's interaction, making social engineering a key component of exploitation. The impact is primarily on the integrity of the update process, as disabling auto updates can leave the site vulnerable to other known or future security flaws by preventing timely patching. The vulnerability affects all versions of the plugin up to and including 1.4. No patches or fixes are currently linked, and no known active exploits have been reported. The CVSS 3.1 score of 4.3 reflects the medium risk, considering the attack vector is network-based, requires no privileges, but does require user interaction. The scope is unchanged, and the impact is limited to integrity with no direct confidentiality or availability effects.

Potential Impact

The primary impact of this vulnerability is the potential compromise of the update integrity mechanism on WordPress sites using the Disable Auto Updates plugin. By disabling automatic updates, attackers can prevent the site from receiving critical security patches, increasing the risk of exploitation from other vulnerabilities. This can lead to prolonged exposure to known security issues, potentially resulting in data breaches, site defacement, or malware infections if other vulnerabilities are exploited subsequently. Since the attack requires an administrator to interact with a malicious link, the risk depends on the effectiveness of user awareness and phishing defenses. Organizations relying on this plugin may face increased operational risk and compliance issues if their WordPress sites are compromised due to delayed updates. The vulnerability does not directly impact confidentiality or availability but indirectly raises the risk of broader compromise. Given the widespread use of WordPress globally, many organizations, especially those managing multiple sites or relying on automated update mechanisms, could be affected.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the Disable Auto Updates plugin and identify the version in use. Immediate mitigation includes restricting administrative access and educating administrators about the risks of clicking unsolicited links. Implementing web application firewalls (WAFs) with rules to detect and block CSRF attempts targeting the plugin's admin page can reduce risk. If possible, disable or remove the plugin until a vendor patch is available. Site administrators should enable multi-factor authentication (MFA) to reduce the risk of account compromise. Monitoring administrative actions and logs for unusual activity related to update settings is recommended. Additionally, organizations can implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts and reduce CSRF attack vectors. Regular backups and incident response plans should be in place to recover from potential compromises resulting from delayed updates. Finally, organizations should track vendor communications for patches or updates addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-10T18:18:35.398Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e50b7ef31ef0b59cb93

Added to database: 2/25/2026, 9:49:04 PM

Last enriched: 2/26/2026, 2:01:48 AM

Last updated: 2/26/2026, 9:20:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats