CVE-2024-12264

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to create administrative user accounts on WordPress sites using the PayU CommercePro Plugin. All WordPress sites with this plugin installed in versions up to 3.8.3 are affected. Attackers can gain full control of vulnerable websites.

💻 Affected Systems

Products:
  • PayU CommercePro Plugin for WordPress
Versions: All versions up to and including 3.8.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated. No special configuration needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrative access, allowing data theft, malware injection, defacement, and further network compromise.

🟠

Likely Case

Attackers create backdoor admin accounts, install malicious plugins/themes, steal sensitive data, and use the site for phishing or malware distribution.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests to vulnerable REST API endpoints. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.8.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/payu-india/tags/3.8.4

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find PayU CommercePro Plugin. 4. Click 'Update Now' if available. 5. If not, download version 3.8.4+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable REST endpoints via .htaccess

all

Blocks access to the vulnerable API endpoints at the web server level

# Add to .htaccess in WordPress root directory
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteRule ^wp-json/payu/v1/(generate-user-token|get-shipping-cost) - [F,L]
</IfModule>

Temporarily deactivate plugin

linux

Completely removes the vulnerability by disabling the plugin

wp plugin deactivate payu-india

🧯 If You Can't Patch

  • Immediately disable the PayU CommercePro Plugin via WordPress admin or command line
  • Implement WAF rules to block requests to /wp-json/payu/v1/* endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins for PayU CommercePro Plugin version. If version is 3.8.3 or lower, you are vulnerable.

Check Version:

wp plugin list --name=payu-india --field=version

Verify Fix Applied:

After updating, verify plugin version shows 3.8.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-json/payu/v1/generate-user-token or /wp-json/payu/v1/get-shipping-cost from unauthenticated users
  • Sudden creation of new administrator user accounts

Network Indicators:

  • Unusual POST requests to WordPress REST API payu endpoints from external IPs
  • Traffic patterns showing admin user creation without prior authentication

SIEM Query:

source="web_server" AND (url_path="/wp-json/payu/v1/generate-user-token" OR url_path="/wp-json/payu/v1/get-shipping-cost") AND http_method="POST" AND user="-"

🔗 References

📤 Share & Export