CVE-2020-36730

8.3 HIGH

📋 TL;DR

The CMP Coming Soon & Maintenance plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to read posts, export subscriber lists, and deactivate the plugin. This affects all WordPress sites running CMP plugin versions up to and including 3.8.1.

💻 Affected Systems

Products:
  • CMP - Coming Soon & Maintenance by NiteoThemes
Versions: All versions up to and including 3.8.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable CMP plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive post content, steal subscriber email lists, and disable the maintenance/coming soon functionality, potentially exposing the site prematurely.

🟠

Likely Case

Unauthenticated attackers reading private posts and exporting subscriber email addresses for spam/phishing campaigns.

🟢

If Mitigated

Limited impact if plugin is not used for sensitive content or subscriber collection, though authorization bypass remains a concern.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests to vulnerable endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.2

Vendor Advisory: https://blog.nintechnet.com/multiple-vulnerabilities-fixed-in-cmp-coming-soon-and-maintenance-plugin/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find CMP - Coming Soon & Maintenance
4. Click 'Update Now' if available
5. Alternatively, download version 3.8.2+ from WordPress repository and manually update

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the CMP plugin until patched

Web application firewall rule

all

Block access to vulnerable endpoints: /wp-admin/admin-ajax.php with cmp_get_post_detail, niteo_export_csv, or cmp_disable_comingsoon_ajax actions

🧯 If You Can't Patch

  • Disable the CMP plugin entirely and use alternative maintenance mode solutions
  • Implement strict network access controls to limit who can reach the WordPress admin-ajax.php endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for CMP version. If version is 3.8.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name='CMP - Coming Soon & Maintenance' --field=version

Verify Fix Applied:

Confirm CMP plugin version is 3.8.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with action parameters containing cmp_get_post_detail, niteo_export_csv, or cmp_disable_comingsoon_ajax from unauthenticated users

Network Indicators:

  • Unusual spikes in requests to admin-ajax.php endpoint from external IPs

SIEM Query:

source="web_access_logs" AND uri="/wp-admin/admin-ajax.php" AND (query="*cmp_get_post_detail*" OR query="*niteo_export_csv*" OR query="*cmp_disable_comingsoon_ajax*")

🔗 References

📤 Share & Export