CVE-2024-8050: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Custom Author Base
The Custom Author Base WordPress plugin through 1.1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI Analysis
Technical Summary
CVE-2024-8050 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Custom Author Base' up to version 1.1.1. This vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, when an authenticated administrator user accesses the WordPress admin interface, an attacker could craft a malicious web request that, if the admin visits a specially crafted webpage, causes the admin's browser to unknowingly submit unauthorized changes to the plugin's configuration. The absence of CSRF tokens or other anti-CSRF mechanisms means the plugin does not verify that the request to update settings originates from a legitimate source, allowing attackers to exploit the trust relationship between the admin's browser and the WordPress site. The vulnerability does not allow direct compromise of confidentiality or availability but can lead to unauthorized modification of plugin settings, potentially altering site behavior or security posture. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that exploitation requires user interaction (the admin must visit a malicious page), no privileges are required to initiate the attack, and the impact is limited to integrity (unauthorized changes) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The plugin's vendor is unknown, which may complicate timely remediation. This vulnerability is classified under CWE-352, a common web application security weakness related to CSRF attacks.
Potential Impact
For European organizations using the Custom Author Base WordPress plugin, this vulnerability poses a moderate risk primarily to the integrity of their website configurations. An attacker exploiting this flaw could modify plugin settings without authorization, potentially enabling further attacks or disrupting site functionality. While the vulnerability does not directly expose sensitive data or cause denial of service, unauthorized configuration changes could weaken site security, misdirect users, or degrade trust in the organization's web presence. Given that WordPress is widely used across Europe for corporate, governmental, and non-profit websites, any compromise of administrative settings can have reputational and operational consequences. Organizations with high-value or public-facing WordPress sites should be particularly cautious, as attackers might leverage this vulnerability as part of a broader attack chain. The requirement for an authenticated admin user to visit a malicious page means internal users must be educated about phishing and social engineering risks. The lack of vendor information and absence of patches may delay mitigation, increasing exposure time.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks initiated from external sources. 2) Implement Content Security Policy (CSP) headers that restrict the domains from which scripts and forms can be submitted, limiting the ability of attackers to craft malicious requests. 3) Educate administrators on the risks of clicking unknown links or visiting untrusted websites while logged into the WordPress admin interface. 4) Monitor and audit plugin settings for unauthorized changes regularly to detect exploitation attempts early. 5) Consider temporarily disabling or replacing the Custom Author Base plugin until a vendor patch or update is available. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting plugin settings endpoints. 7) Use multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise that could facilitate exploitation. 8) Stay informed via trusted vulnerability databases and WordPress security advisories for any forthcoming patches or vendor communications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-8050: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Custom Author Base
Description
The Custom Author Base WordPress plugin through 1.1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
AI-Powered Analysis
Technical Analysis
CVE-2024-8050 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WordPress plugin 'Custom Author Base' up to version 1.1.1. This vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, when an authenticated administrator user accesses the WordPress admin interface, an attacker could craft a malicious web request that, if the admin visits a specially crafted webpage, causes the admin's browser to unknowingly submit unauthorized changes to the plugin's configuration. The absence of CSRF tokens or other anti-CSRF mechanisms means the plugin does not verify that the request to update settings originates from a legitimate source, allowing attackers to exploit the trust relationship between the admin's browser and the WordPress site. The vulnerability does not allow direct compromise of confidentiality or availability but can lead to unauthorized modification of plugin settings, potentially altering site behavior or security posture. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that exploitation requires user interaction (the admin must visit a malicious page), no privileges are required to initiate the attack, and the impact is limited to integrity (unauthorized changes) without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The plugin's vendor is unknown, which may complicate timely remediation. This vulnerability is classified under CWE-352, a common web application security weakness related to CSRF attacks.
Potential Impact
For European organizations using the Custom Author Base WordPress plugin, this vulnerability poses a moderate risk primarily to the integrity of their website configurations. An attacker exploiting this flaw could modify plugin settings without authorization, potentially enabling further attacks or disrupting site functionality. While the vulnerability does not directly expose sensitive data or cause denial of service, unauthorized configuration changes could weaken site security, misdirect users, or degrade trust in the organization's web presence. Given that WordPress is widely used across Europe for corporate, governmental, and non-profit websites, any compromise of administrative settings can have reputational and operational consequences. Organizations with high-value or public-facing WordPress sites should be particularly cautious, as attackers might leverage this vulnerability as part of a broader attack chain. The requirement for an authenticated admin user to visit a malicious page means internal users must be educated about phishing and social engineering risks. The lack of vendor information and absence of patches may delay mitigation, increasing exposure time.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic advice: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to CSRF attacks initiated from external sources. 2) Implement Content Security Policy (CSP) headers that restrict the domains from which scripts and forms can be submitted, limiting the ability of attackers to craft malicious requests. 3) Educate administrators on the risks of clicking unknown links or visiting untrusted websites while logged into the WordPress admin interface. 4) Monitor and audit plugin settings for unauthorized changes regularly to detect exploitation attempts early. 5) Consider temporarily disabling or replacing the Custom Author Base plugin until a vendor patch or update is available. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting plugin settings endpoints. 7) Use multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise that could facilitate exploitation. 8) Stay informed via trusted vulnerability databases and WordPress security advisories for any forthcoming patches or vendor communications.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2024-08-21T17:20:40.365Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec27c
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 8:10:35 AM
Last updated: 7/29/2025, 7:29:21 PM
Views: 10
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.