CVE-2024-12158

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to delete database data in the Ultimate Popup Creator WordPress plugin. Any WordPress site using vulnerable versions of this plugin is affected, potentially causing loss of popup configuration and subscriber data.

💻 Affected Systems

Products:
  • Popup – MailChimp, GetResponse and ActiveCampaign Intergrations (Ultimate Popup Creator)
Versions: All versions up to and including 3.2.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of all plugin data including popup configurations and subscriber lists, potentially disrupting marketing campaigns and requiring full plugin reconfiguration.

🟠

Likely Case

Attackers delete plugin database tables, causing popups to stop functioning and requiring administrator intervention to restore from backups.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary service disruption until data restoration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple AJAX endpoint exploitation requiring no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.7 or later

Vendor Advisory: https://wordpress.org/plugins/ultimate-popup-creator/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Ultimate Popup Creator' and click 'Update Now'. 4. Verify plugin version is 3.2.7 or higher.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Add code to functions.php to remove the vulnerable AJAX action handler

add_action('init', function() { remove_action('wp_ajax_upc_delete_db_data', 'upc_delete_db_data'); remove_action('wp_ajax_nopriv_upc_delete_db_data', 'upc_delete_db_data'); });

Deactivate plugin

linux

Temporarily disable the plugin until patched

wp plugin deactivate ultimate-popup-creator

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to wp-admin/admin-ajax.php with 'upc_delete_db_data' action parameter
  • Restrict access to wp-admin/admin-ajax.php to authenticated users only via .htaccess or web server configuration

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Ultimate Popup Creator version 3.2.6 or earlier

Check Version:

wp plugin list --name='ultimate-popup-creator' --field=version

Verify Fix Applied:

Verify plugin version shows 3.2.7 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=upc_delete_db_data' parameter from unauthenticated users
  • Database DELETE operations on tables containing 'upc_' prefix

Network Indicators:

  • HTTP POST requests to admin-ajax.php with suspicious action parameters

SIEM Query:

source="web_access_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="upc_delete_db_data"

🔗 References

📤 Share & Export