CVE-2020-36724

9.8 CRITICAL

📋 TL;DR

The Wordable WordPress plugin up to version 3.1.1 contains an authentication bypass vulnerability that allows unauthenticated attackers to gain administrator privileges. This occurs due to improper validation of user-supplied hashing algorithms and loose comparison of hash values. All WordPress sites using vulnerable versions of the Wordable plugin are affected.

💻 Affected Systems

Products:
  • Wordable WordPress Plugin
Versions: All versions up to and including 3.1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Wordable plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with attacker gaining administrator access, allowing installation of backdoors, data theft, defacement, or ransomware deployment.

🟠

Likely Case

Attackers gain administrator privileges to modify content, install malicious plugins/themes, or steal sensitive data from the WordPress site.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and regular security monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to vulnerable endpoints. Multiple security vendors have confirmed active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.2 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2234193/wordable/trunk/wordable.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Wordable plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Wordable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wordable

Restrict Plugin Access

all

Use web application firewall to block access to Wordable endpoints

🧯 If You Can't Patch

  • Immediately deactivate and remove the Wordable plugin from all WordPress installations
  • Implement strict network access controls and web application firewall rules to block suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Wordable version 3.1.1 or earlier

Check Version:

wp plugin list --name=wordable --field=version

Verify Fix Applied:

Verify Wordable plugin version is 3.1.2 or later, or confirm plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to Wordable endpoints
  • Multiple failed login attempts followed by successful admin login from new IP
  • Administrator account creation/modification from unexpected sources

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/wordable/ endpoints with unusual parameters
  • Traffic patterns showing unauthenticated users accessing admin functions

SIEM Query:

source="wordpress" AND (uri_path="/wp-content/plugins/wordable/" OR plugin="wordable") AND (status=200 OR user_agent CONTAINS "curl" OR user_agent CONTAINS "wget")

🔗 References

📤 Share & Export