CVE-2021-36888
📋 TL;DR
This vulnerability allows unauthenticated attackers to modify WordPress options, potentially leading to full website compromise. It affects WordPress sites using the Image Hover Effects Ultimate plugin version 9.6.1 or earlier. Attackers can exploit this without any authentication.
💻 Affected Systems
- WordPress Image Hover Effects Ultimate plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete website takeover, data theft, malware injection, and server compromise.
Likely Case
Website defacement, admin account creation, backdoor installation, and SEO spam injection.
If Mitigated
Limited impact if proper network segmentation and WAF rules block exploitation attempts.
🎯 Exploit Status
Simple HTTP POST requests can trigger the vulnerability without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.6.2
Vendor Advisory: https://wordpress.org/plugins/image-hover-effects-ultimate/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Image Hover Effects Ultimate'. 4. Click 'Update Now' or manually update to version 9.6.2+. 5. Verify update completes successfully.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Image Hover Effects Ultimate plugin until patched.
wp plugin deactivate image-hover-effects-ultimate
WAF rule blocking
allBlock requests to vulnerable plugin endpoints via web application firewall.
🧯 If You Can't Patch
- Remove the plugin completely if not essential
- Implement strict network access controls to limit exposure
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Image Hover Effects Ultimate version number.
Check Version:
wp plugin get image-hover-effects-ultimate --field=version
Verify Fix Applied:
Confirm plugin version is 9.6.2 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=iheu_ajax_action
- Unauthenticated admin option modifications
Network Indicators:
- HTTP POST to vulnerable plugin endpoints from unexpected sources
SIEM Query:
source="web_server" AND (uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="iheu_ajax_action")
🔗 References
- https://patchstack.com/database/vulnerability/image-hover-effects-ultimate/wordpress-image-hover-effects-ultimate-plugin-9-6-1-unauthenticated-arbitrary-options-update-leading-to-full-website-compromise
- https://wordpress.org/plugins/image-hover-effects-ultimate/#developers
- https://patchstack.com/database/vulnerability/image-hover-effects-ultimate/wordpress-image-hover-effects-ultimate-plugin-9-6-1-unauthenticated-arbitrary-options-update-leading-to-full-website-compromise
- https://wordpress.org/plugins/image-hover-effects-ultimate/#developers