Depicter Slider Vulnerability – Cross-Site Request Forgery via save – CVE-2023-6493 | WordPress Plugin Vulnerability Report
Plugin Name: Depicter Slider
Key Information:
- Software Type: Plugin
- Software Slug: depicter
- Software Status: Active
- Software Author: averta
- Software Downloads: 727,890
- Active Installs: 80,000
- Last Updated: January 4, 2024
- Patched Versions: 2.0.7
- Affected Versions: <= 2.0.6
Vulnerability Details:
- Name: Depicter Slider – Responsive Image Slider, Video Slider & Post Slider <= 2.0.6 - Cross-Site Request Forgery via save
- Title: Cross-Site Request Forgery via save
- Type: Cross-Site Request Forgery (CSRF)
- CVE: CVE-2023-6493
- CVSS Score: 4.3 (Medium)
- Publicly Published: January 4, 2024
- Researcher: Rafshanzani Suhada
- Description: The Depicter Slider – Responsive Image Slider, Video Slider & Post Slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.6. This is due to missing or incorrect nonce validation on the 'save' function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. CVE-2023-51491 appears to be a duplicate of this issue.
Summary:
The Depicter Slider for WordPress has a vulnerability in versions up to and including 2.0.6 that allows unauthenticated attackers to modify the plugin's settings via a forged request. This vulnerability has been patched in version 2.0.7.
Detailed Overview:
The researcher Rafshanzani Suhada discovered a cross-site request forgery (CSRF) vulnerability in the Depicter Slider plugin affecting versions up to and including 2.0.6. This is due to missing or incorrect nonce validation on the 'save' function which handles saving the plugin's settings. An attacker could exploit this to trick an administrator into clicking a malicious link that submits a request to change the plugin's settings without their knowledge. This could result in unexpected behavior or open up further avenues for compromise. The vulnerability has been assigned CVE identifier CVE-2023-6493 and has a CVSS severity score of 4.3 out of 10, meaning it is considered medium severity.
To remediate this issue, users should upgrade to version 2.0.7 or later which contains the fix to address this vulnerability by adding proper nonce verification to prevent unauthorized modifications to settings.
Advice for Users:
- Immediate Action: Update to version 2.0.7 or later to ensure proper nonce validation is in place.
- Check for Signs of Vulnerability: Review the plugin's settings and configuration for any unexpected changes.
- Alternate Plugins: Consider alternate slider plugins like Smart Slider 3 or MetaSlider as a precaution.
- Stay Updated: Always keep plugins updated to avoid potential vulnerabilities.
Conclusion:
The prompt response from the Depicter Slider developers to patch this vulnerability in version 2.0.7 underscores the importance of timely updates. Users are strongly advised to update as soon as possible to prevent any potential compromise through this vector. Keeping software updated remains one of the most effective means of staying secure.
References:
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/depicter
Detailed Report:
Keeping your WordPress website secure should be a top priority – but with plugins and themes constantly being updated, it can be easy to let things slip through the cracks. Unfortunately, that can leave you vulnerable to attacks. Case in point: a serious security vulnerability was recently disclosed in the popular Depicter Slider plugin, affecting over 80,000 WordPress sites.
About the Plugin: Depicter Slider is a responsive image, video and post slider plugin developed by Averta and downloaded over 727,890 times. With around 80,000 active installs currently using versions up to and including 2.0.6, it has a substantial user base reliant on its functionality.
The Vulnerability:
Researcher Rafshanzani Suhada discovered a cross-site request forgery (CSRF) vulnerability affecting Depicter Slider versions up to and including 2.0.6, identified as CVE-2023-6493. The vulnerability is caused by missing or incorrect nonce validation on the plugin's 'save' function that handles saving settings.
This could allow an attacker to trick an administrator into clicking a malicious link that submits unauthorized changes to the plugin’s settings and behavior. Attackers could leverage this to compromise sites in various ways such as injecting spam, stealing data, or opening up further vulnerabilities.
The vulnerability has a CVSS severity score of 4.3 out of 10, meaning it is considered medium risk.
Impacts and Risks:
If exploited, this vulnerability could enable attackers to make unauthorized configuration changes that alter the functionality of the Depicter Slider plugin. This could be leveraged to compromise the security of the broader WordPress site, lead to site defacements, data theft, or more.
How to Stay Secure:
The good news is Depicter Slider developer Averta has released version 2.0.7 to address this vulnerability by adding proper nonce verification to prevent unauthorized changes to the plugin’s settings.
All administrators using Depicter Slider should immediately update to the latest patched release. You should also be on the lookout for any unexpected changes made to your site’s plugins and themes, which could indicate prior compromise. Consider running automated vulnerability scans as well.
Why Timely Updates Matter:
Exploiting vulnerabilities in outdated plugins is a common attack vector for hackers and can lead to site takeovers, data theft, and more. This is why it’s critical to keep WordPress and all plugins updated in a timely manner.
But with updates happening all the time, it can be hard to stay on top of for busy business owners. This underscores the importance of leveraging available resources like managed website services, audits, and automated tools to ensure your site’s security keeps pace with the latest threats.
By taking advantage of available security assistance and expertise, you can better defend your WordPress site while staying focused on running your business.
As a business owner, you don't have time to constantly monitor for WordPress vulnerabilities like this. At Your WP Guy, we become your outsourced IT team to handle security, updates, maintenance and support. Let us fully audit your site and plugins to assess any impact from this issue. We'll update everything to patched versions so you can rest easy knowing your site is locked down.
Focus on your business goals while we focus on your WordPress site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 for a free consultation on securing your online presence.