Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4103: CWE-352 Cross-Site Request Forgery (CSRF) in giuliopanda ADFO – Custom data in admin dashboard

0
Medium
VulnerabilityCVE-2024-4103cvecve-2024-4103cwe-352
Published: Thu May 09 2024 (05/09/2024, 20:03:33 UTC)
Source: CVE Database V5
Vendor/Project: giuliopanda
Product: ADFO – Custom data in admin dashboard

Description

CVE-2024-4103 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the ADFO – Custom data in admin dashboard WordPress plugin up to version 1. 9. 0. The flaw arises from missing or incorrect nonce validation on several functions, allowing unauthenticated attackers to trick site administrators into executing unwanted actions via forged requests. Exploitation requires user interaction, specifically an administrator clicking a malicious link. The vulnerability impacts the integrity of plugin settings but does not affect confidentiality or availability. No known exploits are currently reported in the wild. The CVSS score is 4. 3 (medium severity), reflecting the limited scope and requirement for user interaction. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized configuration changes.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:28:14 UTC

Technical Analysis

CVE-2024-4103 is a medium-severity vulnerability classified as CWE-352 (Cross-Site Request Forgery) found in the ADFO – Custom data in admin dashboard plugin for WordPress, affecting all versions up to and including 1.9.0. The root cause is the absence or improper implementation of nonce validation on several functions hooked through the controller() function within the plugin. Nonces in WordPress are security tokens used to verify that requests are intentional and originate from legitimate users. Without proper nonce checks, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), result in unauthorized changes to the plugin’s settings. This attack vector does not require the attacker to be authenticated but does require the victim to be an administrator who performs an action that triggers the forged request. The vulnerability impacts the integrity of the plugin’s configuration but does not expose sensitive data or disrupt service availability. The CVSS 3.1 base score of 4.3 reflects the network attack vector, low attack complexity, no privileges required, but requiring user interaction and limited impact on integrity only. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of available patches at the time of disclosure means administrators must rely on temporary mitigations until updates are released.

Potential Impact

The primary impact of CVE-2024-4103 is on the integrity of the affected WordPress plugin’s settings. An attacker exploiting this vulnerability can alter plugin configurations without authorization, potentially enabling further malicious activity or disrupting site functionality. While confidentiality and availability are not directly affected, unauthorized configuration changes can lead to indirect risks such as privilege escalation, data manipulation, or enabling backdoors if the plugin controls critical site features. Since exploitation requires an administrator to be tricked into clicking a link, the risk is somewhat mitigated by user awareness but remains significant in environments with multiple administrators or less security-conscious users. Organizations relying on this plugin for critical dashboard customizations may face operational disruptions or security breaches if exploited. The vulnerability’s network accessibility and lack of required privileges increase its attractiveness to attackers targeting WordPress sites, which are widely used globally.

Mitigation Recommendations

1. Immediate mitigation involves educating administrators to avoid clicking suspicious links or visiting untrusted websites while logged into the WordPress admin dashboard. 2. Implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the plugin’s endpoints, especially those lacking valid nonce tokens. 3. Restrict administrative access by IP whitelisting or VPN to reduce exposure to CSRF attacks. 4. Monitor plugin settings and audit logs for unauthorized changes to detect exploitation attempts early. 5. Disable or remove the ADFO plugin if it is not essential until a patched version is released. 6. Follow the plugin vendor’s updates closely and apply security patches immediately once available. 7. Consider using security plugins that enforce strict nonce validation or provide enhanced CSRF protections. 8. Regularly review and minimize the number of users with administrator privileges to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-23T21:10:00.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b82b7ef31ef0b5561a3

Added to database: 2/25/2026, 9:37:06 PM

Last enriched: 2/26/2026, 12:28:14 AM

Last updated: 2/26/2026, 9:41:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats