CVE-2024-11415

8.8 HIGH

📋 TL;DR

The WP-Orphanage Extended WordPress plugin has a CSRF vulnerability that allows unauthenticated attackers to escalate privileges for all orphan accounts. Attackers can exploit this by tricking administrators into clicking malicious links. All WordPress sites using this plugin up to version 1.2 are affected.

💻 Affected Systems

Products:
  • WP-Orphanage Extended WordPress plugin
Versions: All versions up to and including 1.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. The plugin must be in use with orphan accounts present.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to all orphan accounts, potentially leading to complete site compromise, data theft, malware injection, or site defacement.

🟠

Likely Case

Attackers create backdoor administrator accounts, modify site content, or steal sensitive user data.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation requires social engineering that administrators can avoid.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators, but the technical complexity is low once the administrator performs the action.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.2 (check WordPress plugin repository for latest)

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-orphanage-extended/trunk/wp-orphanage-extended-options.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP-Orphanage Extended. 4. Click 'Update Now' if available, or delete and install latest version from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the WP-Orphanage Extended plugin until patched

wp plugin deactivate wp-orphanage-extended

Add CSRF protection middleware

all

Implement additional CSRF protection at web server or application level

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Use web application firewall (WAF) rules to block CSRF attempts and monitor for privilege escalation patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP-Orphanage Extended version 1.2 or earlier

Check Version:

wp plugin get wp-orphanage-extended --field=version

Verify Fix Applied:

Verify plugin version is updated beyond 1.2 and check that nonce validation is present in wp-orphanage-extended-options.php

📡 Detection & Monitoring

Log Indicators:

  • Multiple orphan account privilege changes in short time
  • Admin actions from unexpected IP addresses or user agents
  • POST requests to wp-orphanage-extended settings without proper nonce

Network Indicators:

  • HTTP requests with CSRF patterns targeting plugin endpoints
  • Unusual traffic to /wp-admin/admin.php?page=wporphanageex_menu_settings

SIEM Query:

source="wordpress.log" AND ("wporphanageex_menu_settings" OR "orphan account privilege")

🔗 References

📤 Share & Export