Multiple Critical Vulnerabilities in WordPress (CVE-2024-11082, CVE-2024-8672, CVE-2024-11925, CVE-2024-11103, CVE-2024-10542, CVE-2024-11024)

Published On: Nov 29, 2024 14:24

Advisory No: TZCERT-SA-24-0048

Source: Wordfence

Software Affected: tumult-hype-animations, widget-options, wp-jobsearch, contest-gallery, cleantalk-spam-protect, apppresser

Overview

WordPress is vulnerable to multiple critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute arbitrary code.

Description

WordPress plugins tumult-hype-animations, widget-options, wp-jobsearch, contest-gallery, cleantalk-spam-protect, and apppresser are affected by the vulnerabilities tracked as CVE-2024-11082, CVE-2024-8672, CVE-2024-11925, CVE-2024-11103, CVE-2024-10542, and CVE-2024-11024 with CVSS scores of 9.9 and 9.8. The plugins are vulnerable due to missing file type validation in the hypeanimations_panel() function, user input passed through eval() without filtering, improper verification of user’s identity when verifying an email address through the user_account_activation function, improper validation of the user's identity before updating their password, authorization bypass via reverse DNS spoofing, and due to the plugin not properly validating a user's password reset code before updating their password respectively. The vulnerabilities allow attackers to takeover user accounts, obtain sensitive data, or achieve code execution on affected systems.

Impact

Successful exploitation of these vulnerabilities may allow the attackers to take control of the affected system.

Solution

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Report Incident