CVE-2024-24710

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Feed Them Social WordPress plugin that allows unauthorized users to access functionality intended only for authenticated users. It affects all versions up to 4.2.0. WordPress sites using this plugin are vulnerable to broken access control attacks.

💻 Affected Systems

Products:
  • Feed Them Social WordPress Plugin
Versions: n/a through 4.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could modify plugin settings, access sensitive social media data, or potentially escalate privileges to compromise the WordPress site.

🟠

Likely Case

Attackers could modify social feed configurations, disrupt social media integrations, or access administrative functions without proper authorization.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized administrators could access plugin functionality, preventing unauthorized modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-plugin-4-2-0-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Feed Them Social. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.2.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate feed-them-social

Restrict Access

all

Use web application firewall rules to restrict access to plugin endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access WordPress admin interfaces
  • Enable detailed logging and monitoring for unauthorized access attempts to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Feed Them Social version. If version is 4.2.0 or earlier, you are vulnerable.

Check Version:

wp plugin get feed-them-social --field=version

Verify Fix Applied:

Verify plugin version is 4.2.1 or later in WordPress admin panel. Test that only authenticated administrators can access plugin functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-admin/admin.php?page=feed-them-settings-page or similar plugin endpoints
  • Failed authentication attempts followed by successful plugin access

Network Indicators:

  • Unusual HTTP requests to plugin-specific endpoints from unauthenticated sources
  • POST requests to plugin configuration endpoints without proper authentication headers

SIEM Query:

source="wordpress.log" AND (uri="*feed-them*" OR uri="*fts*" OR user_agent="*FeedThemSocial*") AND (response_code=200 OR response_code=302) AND NOT (user="admin" OR user="administrator")

🔗 References

📤 Share & Export