CVE-2024-22154

7.5 HIGH

📋 TL;DR

CVE-2024-22154 is an unauthenticated sensitive data exposure vulnerability in the SalesKing WordPress plugin. It allows attackers without authentication to access sensitive information from affected systems. All WordPress sites using SalesKing plugin versions up to 1.6.15 are vulnerable.

💻 Affected Systems

Products:
  • WordPress SalesKing Plugin
Versions: n/a through 1.6.15
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable SalesKing plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive business data, customer information, or system credentials, leading to data breaches, compliance violations, and reputational damage.

🟠

Likely Case

Unauthenticated attackers accessing sensitive plugin data, potentially exposing business information or configuration details.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the exposed plugin data only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation makes this particularly dangerous. While no public PoC is confirmed, the low complexity suggests active exploitation is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.16 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/salesking/wordpress-salesking-plugin-1-6-15-unauthenticated-sensitive-data-exposure-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SalesKing plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.6.16+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable SalesKing Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate salesking

Restrict Plugin Access

all

Use web application firewall to block access to SalesKing plugin endpoints

🧯 If You Can't Patch

  • Remove SalesKing plugin completely from production systems
  • Implement strict network access controls to limit who can access WordPress admin and plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for SalesKing version. If version is 1.6.15 or lower, system is vulnerable.

Check Version:

wp plugin get salesking --field=version

Verify Fix Applied:

Verify SalesKing plugin version is 1.6.16 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to SalesKing plugin endpoints
  • Multiple failed authentication attempts followed by successful data access

Network Indicators:

  • Unusual outbound traffic from WordPress server
  • Requests to SalesKing endpoints from unexpected IP addresses

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/salesking/" OR user_agent CONTAINS "scanner")

🔗 References

📤 Share & Export