CVE-2024-33637

7.5 HIGH

📋 TL;DR

The Solid Affiliate WordPress plugin versions up to 1.9.1 write sensitive information to log files that could be accessed by unauthorized users. This exposes potentially confidential data stored in logs. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Solid Plugins Solid Affiliate WordPress Plugin
Versions: n/a through 1.9.1
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable versions of the plugin regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive information like user credentials, API keys, or personal data stored in logs, leading to account compromise, data breaches, or further attacks.

🟠

Likely Case

Unauthorized users access log files containing sensitive information, potentially exposing affiliate data, configuration details, or other confidential information.

🟢

If Mitigated

With proper file permissions and log file protection, the exposed information remains inaccessible to unauthorized users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to log file locations, which may be publicly accessible depending on server configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/solid-affiliate/wordpress-solid-affiliate-plugin-1-9-1-sensitive-data-exposure-via-log-file-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Solid Affiliate plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.9.2+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict log file access

all

Configure web server to deny access to log file directories

For Apache: Add 'Deny from all' to .htaccess in log directories
For Nginx: Add 'location ~ \.log$ { deny all; }' to site config

Disable plugin

all

Temporarily disable Solid Affiliate plugin until patched

wp plugin deactivate solid-affiliate

🧯 If You Can't Patch

  • Remove or restrict web access to log file directories using server configuration
  • Monitor log files for unauthorized access attempts and implement file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Solid Affiliate version number

Check Version:

wp plugin get solid-affiliate --field=version

Verify Fix Applied:

Verify plugin version is 1.9.2 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log files
  • HTTP requests for .log files in web server logs

Network Indicators:

  • HTTP requests to paths containing 'log' or specific plugin log directories

SIEM Query:

source="web_server" AND (url="*.log" OR url="*/logs/*") AND status=200

🔗 References

📤 Share & Export