CVE-2024-10002

8.8 HIGH

📋 TL;DR

The Rover IDX WordPress plugin has an authentication bypass vulnerability that allows authenticated attackers with subscriber-level permissions or higher to gain administrator access. This affects versions up to and including 3.0.0.2905 due to insufficient validation in the 'rover_idx_refresh_social_callback' function. WordPress sites using vulnerable versions of this plugin are at risk.

💻 Affected Systems

Products:
  • Rover IDX WordPress Plugin
Versions: Versions up to and including 3.0.0.2905
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Rover IDX plugin installed. The vulnerability affects all default configurations of the plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the WordPress site, enabling data theft, malware installation, site defacement, and complete compromise of the web server.

🟠

Likely Case

Attackers with subscriber accounts escalate to administrator privileges, potentially modifying content, installing malicious plugins, or stealing sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized administrative actions would be detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (subscriber or higher). The vulnerability is well-documented with code references available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0.2906

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3173032/rover-idx/trunk/rover-social-common.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Rover IDX plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.0.0.2906 from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable Rover IDX Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate rover-idx

Restrict User Registration

all

Disable new user registration to prevent attackers from obtaining subscriber accounts

Navigate to Settings → General in WordPress admin and uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Remove the Rover IDX plugin completely from your WordPress installation
  • Implement strict monitoring of user privilege changes and administrative actions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Rover IDX version. If version is 3.0.0.2905 or earlier, you are vulnerable.

Check Version:

wp plugin get rover-idx --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 3.0.0.2906 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user privilege escalation from subscriber to administrator
  • Multiple failed login attempts followed by successful administrative actions from previously low-privilege accounts
  • Access to /wp-admin/ from previously non-admin users

Network Indicators:

  • Unusual POST requests to rover_idx_refresh_social_callback endpoint from non-admin users
  • Increased administrative activity from new IP addresses

SIEM Query:

source="wordpress.log" AND ("rover_idx_refresh_social_callback" OR "user role changed" OR "subscriber to administrator")

🔗 References

📤 Share & Export