6.3
MEDIUM
CVE-2022-4974
Freemius WordPress CSRF & Info Disclosure Vulnerability
Description

The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.

INFO

Published Date :

Oct. 16, 2024, 7:15 a.m.

Last Modified :

Oct. 16, 2024, 4:38 p.m.

Remotely Exploitable :

Yes !

Impact Score :

3.4

Exploitability Score :

2.8
Affected Products

The following products are affected by CVE-2022-4974 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Wpexperts new_user_approve
2 Wpexperts rocket_maintenance_mode_\&_coming_soon_page
3 Wpexperts license_manager_for_woocommerce
1 Premmerce premmerce
2 Premmerce premmerce_redirect_manager
3 Premmerce premmerce_product_filter_for_woocommerce
1 Fullworksplugins quick_contact_form
2 Fullworksplugins quick_paypal_payments
1 Nicheaddons events_addon_for_elementor
2 Nicheaddons restaurant_\&_cafe_addon_for_elementor
1 Wpvibes form_vibes
2 Wpvibes elementor_addon_elements
1 Xplodedthemes xt_ajax_add_to_cart_for_woocommerce
2 Xplodedthemes xt_floating_cart_for_woocommerce
1 Fibosearch fibosearch
1 Royal-elementor-addons royal_elementor_addons
1 Oceanwp ocean_extra
1 Tickera tickera
1 Greenshiftwp greenshift_-_animation_and_page_builder_blocks
1 Easysocialfeed easy_social_feed
1 Mycred mycred
1 Themekraft buddyforms
1 Ivorysearch ivory_search
1 Salonbookingsystem salon_booking_system
1 Wordplus better_messages
1 Wpeasypay wp_easypay
1 Fooplugins foogallery
1 Advancedformintegration advanced_form_integration
1 Webba-booking webba_booking
1 Mojofywp wp_affiliate_disclosure
1 Livemeshelementor addons_for_elementor
1 Unlimited-elements unlimited_elements_for_elementor_\(free_widgets\,_addons\,_templates\)
1 Plugins360 all-in-one_video_gallery
1 Surbma gdpr_proof_cookie_consent_\&_notice_bar
1 Livemeshthemes wpbakery_page_builder_addons
1 Wpjoli joli_table_of_contents
1 Bulletin announcement_\&_notification_banner_-_bulletin
1 Themelocation remove_add_to_cart_woocommerce
1 Stevenhenty drop_shadow_boxes
1 Tripetto tripetto
1 Dreamfoxmedia payment_gateway_per_product_for_woocommerce
1 Infornweb posts_list_designer_by_category
1 Internallinkjuicer internal_link_juicer
1 Risethemes rt_easy_builder
1 Vanyukov market_exporter
1 Dotcamp ultimate_blocks
1 Livemesh beaver_builder_addons
1 Softlabbd radio_player
1 Wpdelicious wp_delicious
1 Wp-unit share_this_image
1 Javmah spreadsheet_integration
1 Stellarwp the_events_calendar
1 Blockspare blockspare
1 Bdthemes prime_slider
1 Freshlightlab wp_mobile_menu
1 Streamweasels twitch_integration
1 Melapress wp_activity_log
1 Smartwpress music_player_for_elementor

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-4974 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-4974 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Received by [email protected]

    Oct. 16, 2024

    Action Type Old Value New Value
    Added Description The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
    Added Reference Wordfence https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=cve [No types assigned]
    Added Reference Wordfence https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a [No types assigned]
    Added Reference Wordfence https://freemius.com/blog/managing-security-issues-open-source-freemius-sdk-security-disclosure/ [No types assigned]
    Added Reference Wordfence https://wpdirectory.net/search/01FWPVWA7BC5DYGZHNSZQ9QMN5 [No types assigned]
    Added Reference Wordfence https://wpdirectory.net/search/01G02RSGMFS1TPT63FS16RWEYR [No types assigned]
    Added Reference Wordfence https://web.archive.org/web/20220225174410/https%3A//www.pluginvulnerabilities.com/2022/02/25/our-security-review-of-wordpress-plugin-found-freemius-library-still-contained-vulnerabilities-3-years-after-major-security-incident/ [No types assigned]
    Added CWE Wordfence CWE-862
    Added CVSS V3.1 Wordfence AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-4974 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-4974 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability