CVE-2024-12295

8.8 HIGH

📋 TL;DR

The BoomBox Theme Extensions WordPress plugin allows authenticated attackers with subscriber-level access or higher to reset passwords of any user, including administrators, leading to account takeover. This affects all WordPress sites using the plugin up to version 1.8.0. Attackers can escalate privileges to gain full administrative control.

💻 Affected Systems

Products:
  • BoomBox Theme Extensions WordPress Plugin
Versions: All versions up to and including 1.8.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one authenticated user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain administrative access, install backdoors, steal data, deface the site, or use it for further attacks.

🟠

Likely Case

Administrative account takeover leading to content manipulation, plugin/themes installation, or data exfiltration.

🟢

If Mitigated

Limited impact if strong network segmentation, monitoring, and least privilege principles are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access (subscriber or higher). Attackers need to identify user IDs and craft AJAX requests to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.8.0

Vendor Advisory: https://themeforest.net/item/boombox-viral-buzz-wordpress-theme/16596434

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'BoomBox Theme Extensions'. 4. Click 'Update Now' if available. 5. If no update appears, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily deactivate the BoomBox Theme Extensions plugin to prevent exploitation.

wp plugin deactivate boombox-theme-extensions

🧯 If You Can't Patch

  • Remove all non-essential user accounts, especially those with subscriber or higher privileges.
  • Implement web application firewall (WAF) rules to block requests to the 'boombox_ajax_reset_password' endpoint.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'BoomBox Theme Extensions' version 1.8.0 or lower.

Check Version:

wp plugin get boombox-theme-extensions --field=version

Verify Fix Applied:

Confirm plugin version is higher than 1.8.0 in WordPress admin panel or via 'wp plugin list' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests in WordPress logs
  • Multiple failed login attempts followed by successful login from new IP
  • AJAX requests to '/wp-admin/admin-ajax.php' with action 'boombox_ajax_reset_password'

Network Indicators:

  • POST requests to admin-ajax.php with reset_password parameters
  • Unusual traffic patterns from authenticated user accounts

SIEM Query:

source="wordpress.log" AND "boombox_ajax_reset_password"

🔗 References

📤 Share & Export