CVE-2021-24717

8.8 HIGH

📋 TL;DR

The AutomatorWP WordPress plugin before version 1.7.6 lacks proper capability checks on AJAX endpoints, allowing authenticated users with Subscriber roles to enumerate automations, access private post titles and user emails, execute functions, and potentially escalate privileges. This affects all WordPress sites running vulnerable versions of the AutomatorWP plugin.

💻 Affected Systems

Products:
  • AutomatorWP WordPress plugin
Versions: All versions before 1.7.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with AutomatorWP plugin enabled and at least one user with Subscriber role.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Subscriber-level attackers gain administrative privileges, take full control of the WordPress site, access sensitive data, and potentially compromise the entire web server.

🟠

Likely Case

Unauthorized users access private content, harvest user email addresses, and manipulate automations to disrupt site functionality.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized data viewing without privilege escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated Subscriber access. Public proof-of-concept demonstrates enumeration and data disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.6

Vendor Advisory: https://wpscan.com/vulnerability/5916ea42-eb33-463d-8528-2a142805c91f

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find AutomatorWP and update to version 1.7.6 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoints

all

Remove or restrict access to vulnerable AJAX actions via .htaccess or web server configuration

# Add to .htaccess or server config to block automatorwp_ajax requests
RewriteEngine On
RewriteCond %{REQUEST_URI} ^/wp-admin/admin-ajax\.php$
RewriteCond %{QUERY_STRING} action=automatorwp_ [NC]
RewriteRule ^ - [F,L]

Temporarily disable plugin

linux

Deactivate AutomatorWP plugin until patched

wp plugin deactivate automatorwp

🧯 If You Can't Patch

  • Restrict Subscriber role creation and monitor existing Subscriber accounts for suspicious activity
  • Implement web application firewall rules to block suspicious AJAX requests targeting automatorwp endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for AutomatorWP version. If version is below 1.7.6, system is vulnerable.

Check Version:

wp plugin list --name=automatorwp --field=version

Verify Fix Applied:

Confirm AutomatorWP version is 1.7.6 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Multiple admin-ajax.php requests with action=automatorwp_ from Subscriber-level users
  • Unusual user role changes from Subscriber to higher privileges

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with automatorwp_ actions from non-admin users

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND query="*action=automatorwp_*" AND user_role="subscriber"

🔗 References

📤 Share & Export