CVE-2024-10900

6.5 MEDIUM

📋 TL;DR

The ProfileGrid WordPress plugin has an authorization vulnerability that allows authenticated users (even with low-privilege subscriber accounts) to delete arbitrary user metadata. This can lead to denial of service by removing administrator access capabilities. All WordPress sites using ProfileGrid up to version 5.9.3.6 are affected.

💻 Affected Systems

Products:
  • ProfileGrid – User Profiles, Groups and Communities WordPress plugin
Versions: All versions up to and including 5.9.3.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ProfileGrid plugin active. Any authenticated user (subscriber role or higher) can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical user metadata for all administrators, completely locking them out of their WordPress sites and requiring database-level recovery.

🟠

Likely Case

Attackers delete administrator metadata to cause temporary site access denial, potentially combined with other attacks for privilege escalation.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to temporary service disruption requiring metadata restoration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is simple to execute. Public proof-of-concept exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.3.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3190069%40profilegrid-user-profiles-groups-and-communities&new=3190069%40profilegrid-user-profiles-groups-and-communities&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ProfileGrid plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.9.3.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable ProfileGrid Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate profilegrid-user-profiles-groups-and-communities

Restrict User Registration

all

Disable new user registration to prevent attacker account creation

Update WordPress Settings → General → Membership to 'Anyone can register' = unchecked

🧯 If You Can't Patch

  • Implement strict user role management and monitor for suspicious subscriber activity
  • Add web application firewall rules to block requests to pm_remove_file_attachment function from non-admin users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → ProfileGrid version. If version is 5.9.3.6 or lower, you are vulnerable.

Check Version:

wp plugin get profilegrid-user-profiles-groups-and-communities --field=version

Verify Fix Applied:

After update, confirm ProfileGrid version is 5.9.3.7 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=pm_remove_file_attachment from non-admin users
  • Unusual user_meta deletion events in WordPress logs

Network Indicators:

  • HTTP requests containing 'pm_remove_file_attachment' parameter from low-privilege user sessions

SIEM Query:

source="wordpress.log" AND "pm_remove_file_attachment" AND (user_role="subscriber" OR user_role="contributor" OR user_role="author")

🔗 References

📤 Share & Export