CVE-2024-24796

8.2 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code via PHP object injection due to unsafe deserialization in the WpEvently WordPress plugin. It affects all WordPress sites running the plugin version 4.1.1 or earlier. Attackers can exploit this without authentication to gain control of affected websites.

💻 Affected Systems

Products:
  • Event Manager and Tickets Selling Plugin for WooCommerce – WpEvently – WordPress Plugin
Versions: n/a through 4.1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website compromise leading to data theft, malware installation, defacement, or use as part of a botnet.

🟠

Likely Case

Remote code execution allowing attackers to create administrative accounts, install backdoors, or steal sensitive data.

🟢

If Mitigated

Limited impact if proper web application firewalls and input validation are in place, though risk remains significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to vulnerable endpoints. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/mage-eventpress/wordpress-wpevently-plugin-4-1-1-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WpEvently' plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 4.1.2+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate mage-eventpress

Web Application Firewall Rule

all

Block requests containing serialized PHP objects to vulnerable endpoints.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Deploy a web application firewall with rules to detect and block deserialization attacks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → WpEvently version. If version is 4.1.1 or earlier, you are vulnerable.

Check Version:

wp plugin get mage-eventpress --field=version

Verify Fix Applied:

Verify plugin version is 4.1.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with serialized data
  • Unexpected file creation or modification in wp-content/plugins/mage-eventpress

Network Indicators:

  • HTTP requests containing serialized PHP objects (O: or C: patterns) to vulnerable endpoints

SIEM Query:

source="web_logs" AND (uri="/wp-admin/admin-ajax.php" OR uri="/wp-content/plugins/mage-eventpress") AND (body MATCHES "O:[0-9]+" OR body MATCHES "C:[0-9]+")

🔗 References

📤 Share & Export