CVE-2020-36852

The · The Custom Searchable Data Entry System plugin for WordPress

A critical vulnerability exists in the Custom Searchable Data Entry System plugin for WordPress, which allows an unauthenticated attacker to completely wipe the website's database.

Executive summary

A critical vulnerability exists in the Custom Searchable Data Entry System plugin for WordPress, which allows an unauthenticated attacker to completely wipe the website's database. Due to the lack of any authentication requirement, this vulnerability can be easily exploited by a remote attacker, leading to catastrophic data loss, extended site downtime, and significant reputational damage.

Vulnerability

The vulnerability is caused by a missing capability check on a function responsible for database management. This means the plugin fails to verify if the user initiating a sensitive action has the appropriate permissions. A remote, unauthenticated attacker can send a specially crafted HTTP request to the vulnerable endpoint within the plugin, which will then execute a command to delete all data from the WordPress database without requiring any credentials.

Business impact

This vulnerability is rated as critical with a CVSS score of 9.1. Successful exploitation would result in the complete and irreversible loss of all website data, including posts, pages, user accounts, and settings. The business impact includes immediate and prolonged website downtime, significant costs associated with data recovery (if backups exist), loss of customer trust, and severe reputational harm. Because the attack requires no authentication, it can be easily automated, placing any organization with a vulnerable version of the plugin at high risk of a destructive attack.

Remediation

Immediate Action: Immediately update the "Custom Searchable Data Entry System" plugin to the latest patched version (greater than 1.7.1). After patching, review web server and application access logs for any signs of exploitation attempts that may have occurred prior to the update. If a compromise is suspected, restore the website from a known-good backup.

Proactive Monitoring: Monitor web server access logs for unusual POST or GET requests targeting the plugin's directories and files, particularly from untrusted IP addresses. Implement alerts for any activity related to database deletion or modification commands. Use a file integrity monitoring system to detect unauthorized changes to WordPress core files and plugins.

Compensating Controls: If patching cannot be performed immediately, the following controls can reduce risk:

  • Disable and deactivate the vulnerable plugin until it can be safely updated.
  • Implement a Web Application Firewall (WAF) with rules specifically designed to block malicious requests targeting the plugin's vulnerable functions.
  • Ensure that automated, regular, and verified backups of the entire website (database and files) are being created and stored securely off-site.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical severity (CVSS 9.1) and the unauthenticated nature of this vulnerability, immediate remediation is imperative. All instances of the "Custom Searchable Data Entry System" plugin must be identified and updated to a patched version without delay. The lack of an authentication requirement means any publicly accessible website running a vulnerable version is exposed. Organizations should treat this as an active threat and prioritize patching to prevent catastrophic data loss.