CVE-2023-51670

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the FunnelKit Checkout WordPress plugin that allows authenticated users to activate arbitrary plugins without proper permissions. It affects all WordPress sites running FunnelKit Checkout versions up to 3.10.3. The vulnerability enables privilege escalation and unauthorized plugin activation.

💻 Affected Systems

Products:
  • FunnelKit Checkout (formerly WooFunnels Aero Checkout)
Versions: All versions up to and including 3.10.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin version installed and activated. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could activate malicious plugins to gain administrative privileges, execute arbitrary code, or establish persistent backdoors on the WordPress site.

🟠

Likely Case

Authenticated users with minimal privileges (like subscribers) could activate plugins to gain additional capabilities, potentially leading to data theft, site defacement, or further exploitation.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to authorized users only, reducing the attack surface significantly.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to WordPress. The vulnerability is in authorization checks for plugin activation functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.10.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woofunnels-aero-checkout/wordpress-funnelkit-checkout-plugin-3-10-3-authenticated-arbitrary-plugin-activation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find FunnelKit Checkout. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.10.4+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate FunnelKit Checkout plugin until patched version is available

wp plugin deactivate woofunnels-aero-checkout

Access Restriction

all

Restrict WordPress admin access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict user role management with least privilege principles
  • Monitor and audit plugin activation events in WordPress logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for FunnelKit Checkout version 3.10.3 or earlier

Check Version:

wp plugin get woofunnels-aero-checkout --field=version

Verify Fix Applied:

Verify FunnelKit Checkout version is 3.10.4 or later in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized plugin activation events in WordPress logs
  • Multiple plugin activation attempts by non-admin users

Network Indicators:

  • HTTP POST requests to wp-admin/admin-ajax.php with plugin activation parameters

SIEM Query:

source="wordpress" AND (event="plugin_activated" OR message="*activated*plugin*") AND user_role!="administrator"

🔗 References

📤 Share & Export