CVE-2024-10663

4.3 MEDIUM

📋 TL;DR

The Eleblog WordPress plugin has an authorization vulnerability that allows any authenticated user (including basic Subscribers) to submit plugin deactivation feedback. This enables unauthorized data modification but doesn't grant administrative access or code execution. All WordPress sites using vulnerable Eleblog versions are affected.

💻 Affected Systems

Products:
  • Eleblog – Elementor Blog And Magazine Addons for WordPress
Versions: All versions up to and including 1.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Eleblog plugin and at least one authenticated user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could flood the system with deactivation requests, potentially causing denial of service or interfering with plugin usage statistics.

🟠

Likely Case

Unauthorized users submitting false deactivation reasons, which could mislead site administrators about plugin issues.

🟢

If Mitigated

Minimal impact - only allows submission of deactivation feedback forms without access to sensitive data or system control.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but only basic Subscriber privileges. Simple HTTP POST request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/ele-blog/trunk/inc/class-ele-blog-quick-feedback.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Eleblog – Elementor Blog And Magazine Addons'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.9+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the Eleblog plugin until patched

wp plugin deactivate ele-blog
wp plugin delete ele-blog

Restrict user registration

all

Prevent new user accounts from being created to limit attack surface

wp option update users_can_register 0

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to the goodbye_form_callback endpoint
  • Monitor and audit user-submitted deactivation feedback for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Eleblog version. If version is 1.8 or lower, system is vulnerable.

Check Version:

wp plugin get ele-blog --field=version

Verify Fix Applied:

Verify Eleblog plugin version is 1.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=ele_blog_deactivate_feedback from non-admin users
  • Unusual deactivation feedback submissions from low-privilege users

Network Indicators:

  • HTTP POST requests containing 'ele_blog_deactivate_feedback' action parameter

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "ele_blog_deactivate_feedback" AND user_role!="administrator"

🔗 References

📤 Share & Export