CVE-2024-30485

8.8 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Finale Lite WordPress plugin that allows authenticated users with subscriber-level permissions to install and activate arbitrary plugins. This affects all WordPress sites running Finale Lite versions up to 2.18.0. The vulnerability enables privilege escalation and potential remote code execution.

💻 Affected Systems

Products:
  • Finale Lite - WooCommerce Sales Countdown Timer & Discount Plugin
Versions: All versions up to and including 2.18.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Finale Lite plugin installed. Any user with subscriber role or higher can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with subscriber access could install malicious plugins, gain administrative privileges, execute arbitrary code, and completely compromise the WordPress site and underlying server.

🟠

Likely Case

Attackers exploiting this would install backdoor plugins to maintain persistent access, steal sensitive data, or use the site for malicious activities like phishing or malware distribution.

🟢

If Mitigated

With proper authorization checks and least privilege principles, subscribers would be restricted to their intended permissions, preventing plugin installation capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires subscriber-level authentication. The vulnerability is well-documented with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.19.0 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/finale-woocommerce-sales-countdown-timer-discount/wordpress-finale-lite-plugin-2-18-0-subscriber-arbitrary-plugin-installation-activation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Finale Lite' and click 'Update Now'. 4. Alternatively, download version 2.19.0+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Finale Lite plugin until patched to prevent exploitation

wp plugin deactivate finale-woocommerce-sales-countdown-timer-discount

Restrict User Registration

all

Temporarily disable new user registration to prevent attackers from obtaining subscriber accounts

🧯 If You Can't Patch

  • Remove the Finale Lite plugin completely and use alternative WooCommerce countdown solutions
  • Implement web application firewall rules to block plugin installation requests from non-admin users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Finale Lite version. If version is 2.18.0 or lower, you are vulnerable.

Check Version:

wp plugin get finale-woocommerce-sales-countdown-timer-discount --field=version

Verify Fix Applied:

After updating, verify Finale Lite version is 2.19.0 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • WordPress logs showing plugin installation/activation by non-admin users
  • HTTP POST requests to /wp-admin/update.php or plugin installation endpoints from subscriber accounts

Network Indicators:

  • Unusual plugin installation traffic patterns
  • Requests to plugin repositories from non-admin IPs

SIEM Query:

source="wordpress.log" AND ("plugin installed" OR "plugin activated") AND user_role="subscriber"

🔗 References

📤 Share & Export