CVE-2024-22154
📋 TL;DR
CVE-2024-22154 is an unauthenticated sensitive data exposure vulnerability in the SalesKing WordPress plugin. It allows attackers without authentication to access sensitive information from affected systems. All WordPress sites using SalesKing plugin versions up to 1.6.15 are vulnerable.
💻 Affected Systems
- WordPress SalesKing Plugin
📦 What is this software?
Salesking by Snpdigital
⚠️ Risk & Real-World Impact
Worst Case
Attackers could exfiltrate sensitive business data, customer information, or system credentials, leading to data breaches, compliance violations, and reputational damage.
Likely Case
Unauthenticated attackers accessing sensitive plugin data, potentially exposing business information or configuration details.
If Mitigated
With proper network segmentation and access controls, impact would be limited to the exposed plugin data only.
🎯 Exploit Status
Unauthenticated exploitation makes this particularly dangerous. While no public PoC is confirmed, the low complexity suggests active exploitation is likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.16 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/salesking/wordpress-salesking-plugin-1-6-15-unauthenticated-sensitive-data-exposure-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SalesKing plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.6.16+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable SalesKing Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate salesking
Restrict Plugin Access
allUse web application firewall to block access to SalesKing plugin endpoints
🧯 If You Can't Patch
- Remove SalesKing plugin completely from production systems
- Implement strict network access controls to limit who can access WordPress admin and plugin endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for SalesKing version. If version is 1.6.15 or lower, system is vulnerable.
Check Version:
wp plugin get salesking --field=version
Verify Fix Applied:
Verify SalesKing plugin version is 1.6.16 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to SalesKing plugin endpoints
- Multiple failed authentication attempts followed by successful data access
Network Indicators:
- Unusual outbound traffic from WordPress server
- Requests to SalesKing endpoints from unexpected IP addresses
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-content/plugins/salesking/" OR user_agent CONTAINS "scanner")
🔗 References
- https://patchstack.com/database/vulnerability/salesking/wordpress-salesking-plugin-1-6-15-unauthenticated-sensitive-data-exposure-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/salesking/wordpress-salesking-plugin-1-6-15-unauthenticated-sensitive-data-exposure-vulnerability?_s_id=cve