CVE-2024-1955

4.3 MEDIUM

📋 TL;DR

The Hide Dashboard Notifications WordPress plugin has a missing capability check vulnerability that allows authenticated users with contributor-level access or higher to modify plugin settings. This affects all versions up to and including 1.3. Attackers can change plugin configuration without proper authorization.

💻 Affected Systems

Products:
  • Hide Dashboard Notifications WordPress Plugin
Versions: All versions up to and including 1.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disable security notifications, hide malicious activity, or reconfigure the plugin to facilitate further attacks while evading detection.

🟠

Likely Case

Malicious contributors or compromised accounts modify plugin settings to hide their activities or disrupt normal WordPress dashboard functionality.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to unauthorized setting changes that can be detected and reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has contributor credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-hide-backed-notices

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Hide Dashboard Notifications'
4. Click 'Update Now' if available
5. If no update available, deactivate and delete the plugin
6. Install the latest version from WordPress repository

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily restrict contributor-level users from accessing the WordPress site until patching is complete.

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation while maintaining site functionality.

🧯 If You Can't Patch

  • Implement strict user access controls and monitor contributor-level accounts
  • Add WordPress security plugins that detect unauthorized setting changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Hide Dashboard Notifications' version 1.3 or earlier

Check Version:

wp plugin list --name='hide-dashboard-notifications' --field=version

Verify Fix Applied:

Confirm plugin version is higher than 1.3 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to plugin settings endpoints
  • Unexpected changes to plugin configuration

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with plugin-specific actions

SIEM Query:

source="wordpress.log" AND ("warning_notices_settings" OR "hide-dashboard-notifications") AND status=200

🔗 References

📤 Share & Export