CVE-2024-0869
📋 TL;DR
This vulnerability allows WordPress users with 'author' role or higher to modify arbitrary site options through the Instant Images plugin's REST API endpoint. Attackers can change critical WordPress settings, potentially compromising site security. All WordPress sites using Instant Images plugin versions up to 6.1.0 are affected.
💻 Affected Systems
- Instant Images WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover by modifying administrator credentials, enabling malicious plugins, or changing site configuration to redirect visitors to malicious sites.
Likely Case
Unauthorized modification of site settings, injection of malicious code, or privilege escalation by changing user roles and capabilities.
If Mitigated
Limited impact if proper access controls and monitoring are in place, with potential for unauthorized option changes but quick detection.
🎯 Exploit Status
Exploitation requires at least author-level WordPress credentials. The vulnerability is straightforward to exploit once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.1.1
Vendor Advisory: https://wordpress.org/plugins/instant-images/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Instant Images' and click 'Update Now'. 4. Verify version shows 6.1.1 or higher.
🔧 Temporary Workarounds
Disable Instant Images Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate instant-images
Restrict REST API Access
linuxLimit access to the vulnerable REST endpoint using .htaccess or web server configuration
# Add to .htaccess:
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule ^wp-json/instant-images/license - [F,L]
</IfModule>
🧯 If You Can't Patch
- Implement strict access controls and monitor user activity, especially for author+ roles
- Regularly audit WordPress options table for unauthorized changes and maintain backups
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Instant Images → Version. If version is 6.1.0 or lower, you are vulnerable.
Check Version:
wp plugin get instant-images --field=version
Verify Fix Applied:
After updating, verify Instant Images plugin shows version 6.1.1 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-json/instant-images/license endpoint
- Unexpected modifications to wp_options table in database logs
Network Indicators:
- HTTP POST requests to instant-images/license REST endpoint from unauthorized or unexpected sources
SIEM Query:
source="wordpress" AND (uri_path="/wp-json/instant-images/license" OR event_description="option_update")
🔗 References
- https://plugins.trac.wordpress.org/browser/instant-images/tags/6.1.0/api/license.php#L91
- https://plugins.trac.wordpress.org/changeset/3027110/instant-images/tags/6.1.1/api/license.php
- https://wordpress.org/plugins/instant-images/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/17941fbb-c5da-4f5c-a617-3792eb4ef395?source=cve
- https://plugins.trac.wordpress.org/browser/instant-images/tags/6.1.0/api/license.php#L91
- https://plugins.trac.wordpress.org/changeset/3027110/instant-images/tags/6.1.1/api/license.php
- https://wordpress.org/plugins/instant-images/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/17941fbb-c5da-4f5c-a617-3792eb4ef395?source=cve