CVE-2021-24215
📋 TL;DR
This vulnerability allows unauthenticated attackers to access WordPress admin customization and settings pages through the Controlled Admin Access plugin. Attackers can modify site settings and potentially take full control of the WordPress installation. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- WordPress Controlled Admin Access Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the WordPress site including defacement, data theft, malware injection, and server takeover.
Likely Case
Unauthorized modification of site settings, theme customization, plugin installation, and administrative privilege escalation.
If Mitigated
Limited impact with proper network segmentation and web application firewalls blocking unauthorized admin access.
🎯 Exploit Status
Exploitation requires direct access to vulnerable endpoints without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.2
Vendor Advisory: https://wordpress.org/plugins/controlled-admin-access/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Controlled Admin Access plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.2+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate controlled-admin-access
Block Vulnerable Endpoints
linuxUse web application firewall or .htaccess to block access to vulnerable paths
RewriteEngine On
RewriteRule ^wp-admin/(customization\.php|options\.php)$ - [F,L]
🧯 If You Can't Patch
- Remove the Controlled Admin Access plugin completely
- Implement strict IP-based access controls to WordPress admin area
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Controlled Admin Access version number
Check Version:
wp plugin get controlled-admin-access --field=version
Verify Fix Applied:
Verify plugin version is 1.5.2 or higher
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to /wp-admin/customization.php
- Unauthorized access to /wp-admin/options.php
- Multiple failed admin access attempts
Network Indicators:
- HTTP requests to vulnerable endpoints without authentication
- Unusual POST requests to admin settings pages
SIEM Query:
source="web_access.log" AND (uri="/wp-admin/customization.php" OR uri="/wp-admin/options.php") AND status=200 AND NOT user_agent="WordPress/*"
🔗 References
- https://m0ze.ru/vulnerability/%5B2021-03-18%5D-%5BWordPress%5D-%5BCWE-284%5D-Controlled-Admin-Access-WordPress-Plugin-v1.4.0.txt
- https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20
- https://m0ze.ru/vulnerability/%5B2021-03-18%5D-%5BWordPress%5D-%5BCWE-284%5D-Controlled-Admin-Access-WordPress-Plugin-v1.4.0.txt
- https://wpscan.com/vulnerability/eec0f29f-a985-4285-8eed-d1855d204a20