CVE-2023-47822

5.4 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPress plugin that allows attackers to exploit incorrectly configured access controls. It affects all versions up to 4.10, potentially allowing unauthorized users to perform actions they shouldn't be able to. WordPress site administrators using this plugin are affected.

💻 Affected Systems

Products:
  • MP3 Audio Player for Music, Radio & Podcast by Sonaar WordPress plugin
Versions: All versions up to and including 4.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin version installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings, upload malicious files, or access administrative functions without authentication, potentially leading to site compromise.

🟠

Likely Case

Unauthorized users could change player configurations, upload content, or access restricted plugin features they shouldn't have access to.

🟢

If Mitigated

With proper access controls and authentication checks, the vulnerability would be prevented, limiting users to their authorized permissions only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 4.10

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/mp3-music-player-by-sonaar/vulnerability/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'MP3 Audio Player for Music, Radio & Podcast by Sonaar'
4. Click 'Update Now' if available
5. If no update is available, deactivate and delete the plugin

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate mp3-music-player-by-sonaar

Restrict plugin access

all

Use WordPress role management to restrict who can access plugin settings

🧯 If You Can't Patch

  • Deactivate the MP3 Audio Player plugin immediately
  • Implement web application firewall rules to block unauthorized access to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'MP3 Audio Player for Music, Radio & Podcast by Sonaar' version 4.10 or earlier

Check Version:

wp plugin get mp3-music-player-by-sonaar --field=version

Verify Fix Applied:

Verify plugin version is higher than 4.10 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to plugin admin endpoints
  • Unexpected plugin configuration changes

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with plugin-specific actions from unauthorized IPs

SIEM Query:

source="wordpress.log" AND ("mp3-music-player" OR "sonaar") AND ("admin-ajax" OR "wp-admin") AND status=200 AND user_role!=administrator

🔗 References

📤 Share & Export