WordPress Plugin Flaw Let Attackers Seize Administrative Control – CybersecurityNews

A critical vulnerability has been discovered in the popular Profile Builder and Profile Builder Pro plugins, with over 50,000 active installations.
The flaw, identified during a routine audit of various WordPress plugins, allows unauthenticated attackers to escalate their privileges and gain administrative access to targeted sites without possessing account credentials.
As reported by WPScan, the vulnerability tracked as CVE-2024-6695 has been assigned a CVSSv3.1 score of 9.8, indicating its critical severity. The flaw was addressed and patched on July 11th, 2024, with the release of plugin version 3.11.9.
The issue has also been cataloged in the WordPress Vulnerability Database under WPVDB-ID 4afa5c85-ce27-4ca7-bba2-61fb39c53a5b.
The vulnerability stems from inconsistencies in how the plugins handle user-provided email information during registration.
Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files
When a new user registers, the plugin performs several checks to validate the email address and ensure the user is not already registered. However, a flaw in these checks creates an exploitable situation.
Here’s a brief overview of the process:
The vulnerability arises from the lack of consistency in handling the user-provided email information at various stages of this process. This inconsistency allows attackers to manipulate the registration process and gain administrative access.
The implications of this vulnerability are severe, as it allows attackers to perform unauthorized actions with administrative privileges. This could lead to the complete compromise of affected websites, including data theft, defacement, and further exploitation.
Website administrators using the Profile Builder and Profile Builder Pro plugins are strongly advised to update to version 3.11.9 immediately to mitigate the risk.
The update addresses the vulnerability by consistently handling user-provided email information and enhancing security checks during registration.
A proof of concept demonstrating the exploitation of this vulnerability is scheduled to be released on August 5th, 2024.
This release will likely provide further insights into the flaw’s mechanics and underscore the importance of timely updates and robust security practices.
As the WordPress ecosystem grows, the discovery of such vulnerabilities highlights the need for continuous vigilance and proactive security measures to protect websites and their users from emerging threats.
"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

source

Leave a Reply

Your email address will not be published. Required fields are marked *