CVE-2024-32798

7.5 HIGH

📋 TL;DR

CVE-2024-32798 is a missing authorization vulnerability in WP Travel Engine WordPress plugin that allows attackers to manipulate booking prices without proper authentication. This affects all WordPress sites running WP Travel Engine versions up to 5.8.0. Attackers can exploit this to modify trip prices, potentially leading to financial loss or unauthorized discounts.

💻 Affected Systems

Products:
  • WP Travel Engine WordPress Plugin
Versions: n/a through 5.8.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with WP Travel Engine plugin installed, regardless of WordPress version or hosting environment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could set trip prices to zero or minimal amounts, causing significant revenue loss through fraudulent bookings, or manipulate prices to disrupt business operations.

🟠

Likely Case

Price manipulation leading to unauthorized discounts or free bookings, resulting in financial loss and potential customer data exposure during booking processes.

🟢

If Mitigated

With proper authorization controls, only authenticated administrators could modify prices, preventing unauthorized changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated price manipulation, making it relatively easy to exploit with basic web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.8.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-travel-engine/wordpress-wp-travel-engine-plugin-5-8-0-price-manipulation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Travel Engine and click 'Update Now'. 4. Verify update to version 5.8.1 or later.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable WP Travel Engine plugin until patched

wp plugin deactivate wp-travel-engine

Web Application Firewall Rule

all

Block unauthorized price modification requests

Add WAF rule to block POST requests to wp-travel-engine endpoints without proper authorization headers

🧯 If You Can't Patch

  • Implement strict access controls to limit who can modify booking prices
  • Monitor booking transactions for suspicious price changes and implement manual verification

🔍 How to Verify

Check if Vulnerable:

Check WP Travel Engine plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin get wp-travel-engine --field=version

Verify Fix Applied:

Verify plugin version is 5.8.1 or higher and test price modification functionality requires proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to wp-travel-engine endpoints
  • Sudden price changes in booking logs
  • Multiple booking attempts with unusually low prices

Network Indicators:

  • HTTP requests to /wp-content/plugins/wp-travel-engine/ with price modification parameters from unauthenticated sources

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/wp-travel-engine/" AND http_method="POST" AND NOT user_agent="WordPress")

🔗 References

📤 Share & Export