CVE-2024-10783

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to gain administrator access on WordPress sites running MainWP Child plugin versions up to 5.2 when the plugin is installed but not yet connected to the MainWP Dashboard. Only sites with MainWP Child in an unconfigured state and without the unique security ID feature enabled are affected.

💻 Affected Systems

Products:
  • MainWP Child WordPress plugin
Versions: All versions up to and including 5.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects sites where MainWP Child is installed but not connected to MainWP Dashboard AND unique security ID feature is disabled. Sites already connected are NOT affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrator privileges, allowing data theft, malware injection, or site destruction.

🟠

Likely Case

Unauthenticated attackers gaining administrator access to vulnerable WordPress installations.

🟢

If Mitigated

No impact if plugin is properly configured or patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill once vulnerability details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3

Vendor Advisory: https://wordpress.org/plugins/mainwp-child/

Restart Required: No

Instructions:

1. Update MainWP Child plugin to version 5.3 or higher via WordPress admin panel. 2. Verify plugin is updated to at least 5.3. 3. Ensure unique security ID feature is enabled for additional protection.

🔧 Temporary Workarounds

Enable unique security ID

all

Enable the unique security ID feature in MainWP Child settings to prevent exploitation

Connect to MainWP Dashboard

all

Complete the connection to MainWP Dashboard to remove vulnerable state

🧯 If You Can't Patch

  • Immediately connect MainWP Child to MainWP Dashboard if using the plugin
  • Disable or remove MainWP Child plugin if not actively used

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for MainWP Child plugin version. If version ≤5.2 AND plugin is not connected to MainWP Dashboard AND unique security ID is disabled, system is vulnerable.

Check Version:

wp plugin list --name=mainwp-child --field=version

Verify Fix Applied:

Verify MainWP Child plugin version is ≥5.3 OR plugin is connected to MainWP Dashboard OR unique security ID is enabled.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to register_site function
  • Sudden administrator account creation or privilege changes

Network Indicators:

  • HTTP POST requests to WordPress admin-ajax.php or similar endpoints with MainWP Child parameters

SIEM Query:

source="wordpress.log" AND ("register_site" OR "mainwp-child") AND status="200" AND user="-"

🔗 References

📤 Share & Export