CVE-2024-25092

8.8 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the NextMove Lite WordPress plugin that allows authenticated users with subscriber-level permissions to install and activate arbitrary plugins. This affects all WordPress sites running NextMove Lite versions up to 2.17.0. The vulnerability enables privilege escalation and potential remote code execution.

💻 Affected Systems

Products:
  • XLPlugins NextMove Lite
Versions: All versions up to and including 2.17.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with NextMove Lite plugin active and at least one subscriber-level user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with subscriber access could install malicious plugins, gain administrator privileges, execute arbitrary code, and completely compromise the WordPress site and underlying server.

🟠

Likely Case

Attackers exploiting this vulnerability would install backdoor plugins to maintain persistent access, steal sensitive data, or use the site for malicious activities like phishing or malware distribution.

🟢

If Mitigated

With proper authorization controls and least privilege principles, subscriber users would be prevented from plugin management actions, limiting the attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires subscriber-level credentials. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.17.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woo-thank-you-page-nextmove-lite/wordpress-nextmove-lite-plugin-2-17-0-subscriber-arbitrary-plugin-installation-activation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find NextMove Lite and update to version 2.17.1 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate NextMove Lite plugin until patched

wp plugin deactivate woo-thank-you-page-nextmove-lite

Restrict Subscriber Capabilities

all

Use WordPress role management plugins to remove plugin installation capabilities from subscriber role

🧯 If You Can't Patch

  • Implement network segmentation to isolate WordPress installation from critical systems
  • Enable detailed logging and monitoring for plugin installation activities and review regularly

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for NextMove Lite version 2.17.0 or earlier

Check Version:

wp plugin get woo-thank-you-page-nextmove-lite --field=version

Verify Fix Applied:

Verify NextMove Lite plugin version is 2.17.1 or later in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized plugin installation attempts in WordPress logs
  • Subscriber users performing plugin management actions

Network Indicators:

  • Unusual outbound connections after plugin installation
  • Requests to WordPress plugin installation endpoints from non-admin users

SIEM Query:

source="wordpress" AND (event="plugin_installed" OR event="plugin_activated") AND user_role="subscriber"

🔗 References

📤 Share & Export