Critical Vulnerabilities in WordPress (CVE-2024-10924, CVE-2024-10571)

Imechapishwa: Nov 15, 2024 15:46

Advisory No: TZCERT-SA-24-0046

Source: Wordfence

Software Affected: really-simple-ssl, chart-builder

Overview

WordPress is vulnerable to critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute arbitrary code.

Description

WordPress plugins really-simple-ssl, and chart-builder are affected by the vulnerabilities tracked as CVE-2024-10924, and CVE-2024-10571with CVSS scores of 9.8 each. The plugins are vulnerable due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function, and a Local File Inclusion via the 'source' parameter. The vulnerabilities allow attackers to bypass access controls, obtain sensitive data, or achieve code execution on affected systems.

Impact

Successful exploitation of these vulnerabilities may allow the attackers to take control of the affected system.

Solution

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Ripoti Tukio