CVE-2020-28642

9.8 CRITICAL

📋 TL;DR

CVE-2020-28642 is a critical vulnerability in InfiniteWP Admin Panel that allows remote attackers to take over administrator accounts by exploiting weak password-reset code generation. This affects all organizations using InfiniteWP Admin Panel versions before 3.1.12.3 for WordPress site management.

💻 Affected Systems

Products:
  • InfiniteWP Admin Panel
Versions: All versions before 3.1.12.3
Operating Systems: All platforms running InfiniteWP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the password reset functionality specifically; any installation with password reset enabled is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the InfiniteWP Admin Panel, allowing attackers to execute arbitrary code on all managed WordPress sites, steal sensitive data, and maintain persistent access.

🟠

Likely Case

Administrative account takeover leading to unauthorized access to managed WordPress sites, potential malware injection, and data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation and strong authentication controls, though the vulnerability still exists.

🌐 Internet-Facing: HIGH - The InfiniteWP Admin Panel is typically internet-facing, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - If deployed internally only, risk is reduced but still significant if internal network is compromised.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the password reset mechanism, making exploitation straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.12.3

Vendor Advisory: https://wordpress.org/plugins/iwp-client/#developers

Restart Required: No

Instructions:

1. Log into InfiniteWP Admin Panel. 2. Navigate to Updates section. 3. Update to version 3.1.12.3 or later. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Password Reset

all

Temporarily disable password reset functionality to prevent exploitation.

Modify InfiniteWP configuration to disable password reset feature

Network Isolation

all

Restrict access to InfiniteWP Admin Panel to trusted IP addresses only.

Configure firewall rules to allow only specific IPs to access InfiniteWP port

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the InfiniteWP Admin Panel
  • Enable multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check InfiniteWP Admin Panel version in the dashboard or via the plugin directory; versions below 3.1.12.3 are vulnerable.

Check Version:

Check the version displayed in the InfiniteWP Admin Panel dashboard or plugin settings.

Verify Fix Applied:

Confirm version is 3.1.12.3 or higher in the InfiniteWP Admin Panel interface.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from single IP
  • Successful password reset for admin account from unusual IP

Network Indicators:

  • Unusual traffic patterns to password reset endpoint
  • Requests to /resetPasswordSendMail with suspicious parameters

SIEM Query:

source="infinitewp" AND (event="password_reset" OR url="/resetPasswordSendMail")

🔗 References

📤 Share & Export