CVE-2024-2409

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to create administrator accounts on WordPress sites running the MasterStudy LMS plugin. It affects all WordPress installations using MasterStudy LMS versions up to 3.3.1 when the Pro version and LMS Forms Editor add-on are enabled. Attackers can gain full control of affected websites without any authentication.

💻 Affected Systems

Products:
  • MasterStudy LMS WordPress plugin
Versions: All versions up to and including 3.3.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Requires MasterStudy LMS Pro to be installed AND the LMS Forms Editor add-on to be enabled. Free version alone is not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with attacker gaining administrator privileges, installing backdoors, stealing sensitive data, defacing the site, or using it for further attacks.

🟠

Likely Case

Attackers create administrator accounts to maintain persistent access, install malware, or use the compromised site for phishing campaigns.

🟢

If Mitigated

With proper monitoring and access controls, unauthorized admin accounts could be detected and removed before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted AJAX request to wp-admin/admin-ajax.php with specific parameters to trigger the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.2

Vendor Advisory: https://docs.stylemixthemes.com/masterstudy-lms/changelog-free-version#id-3.3.2

Restart Required: No

Instructions:

1. Update MasterStudy LMS plugin to version 3.3.2 or higher via WordPress admin dashboard. 2. Verify the update completed successfully. 3. Check that no unauthorized administrator accounts exist.

🔧 Temporary Workarounds

Disable LMS Forms Editor add-on

all

Temporarily disable the vulnerable LMS Forms Editor add-on in MasterStudy LMS Pro settings

Restrict AJAX endpoint access

linux

Use web application firewall or .htaccess to restrict access to wp-admin/admin-ajax.php from untrusted sources

# Example .htaccess rule to restrict admin-ajax.php
<Files "admin-ajax.php">
    Order Deny,Allow
    Deny from all
    Allow from 192.168.1.0/24  # Allow only internal IPs
</Files>

🧯 If You Can't Patch

  • Disable MasterStudy LMS Pro plugin entirely until patched
  • Implement strict monitoring for new user registrations and administrator account creation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin dashboard for MasterStudy LMS plugin version. If version is 3.3.1 or lower AND MasterStudy LMS Pro is installed AND LMS Forms Editor is enabled, the site is vulnerable.

Check Version:

wp plugin list --name=masterstudy-lms --field=version

Verify Fix Applied:

Verify plugin version is 3.3.2 or higher in WordPress admin dashboard. Test that unauthenticated user registration no longer allows administrator role assignment.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=stm_lms_register
  • New administrator user accounts created from unexpected IP addresses
  • Multiple failed registration attempts followed by successful admin creation

Network Indicators:

  • HTTP POST requests to admin-ajax.php with stm_lms_register parameter from external IPs
  • Unusual spikes in traffic to WordPress AJAX endpoints

SIEM Query:

source="web_logs" AND uri_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND (form_data CONTAINS "stm_lms_register" OR query_string CONTAINS "action=stm_lms_register")

🔗 References

📤 Share & Export