CVE-2024-34388

7.5 HIGH

📋 TL;DR

The Scribit GDPR Compliance WordPress plugin versions up to 1.2.5 contain a sensitive data exposure vulnerability that allows unauthorized actors to access confidential information. This affects WordPress sites using the vulnerable plugin version, potentially exposing GDPR-related data.

💻 Affected Systems

Products:
  • Scribit GDPR Compliance WordPress Plugin
Versions: n/a through 1.2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive GDPR compliance data, user consent records, or other confidential information stored by the plugin, leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized access to plugin configuration data, user consent logs, or other GDPR-related information stored in the WordPress database.

🟢

If Mitigated

Limited exposure of non-critical plugin metadata with proper access controls and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-200 vulnerabilities typically involve simple information disclosure through direct access to endpoints or files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.2.5

Vendor Advisory: https://patchstack.com/database/vulnerability/gdpr-compliance/wordpress-gdpr-compliance-plugin-1-2-5-sensitive-data-exposure-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard
2. Navigate to Plugins > Installed Plugins
3. Find 'GDPR Compliance' plugin
4. Click 'Update Now' if available
5. Alternatively, download latest version from WordPress repository
6. Deactivate and delete old version
7. Upload and activate new version

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate gdpr-compliance

Access Restriction via .htaccess

linux

Restrict access to plugin directories

Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable web application firewall rules to block suspicious requests to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for GDPR Compliance version 1.2.5 or earlier

Check Version:

wp plugin get gdpr-compliance --field=version

Verify Fix Applied:

Verify plugin version is higher than 1.2.5 in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /wp-content/plugins/gdpr-compliance/
  • Multiple 200 OK responses to plugin-specific endpoints from unauthorized IPs

Network Indicators:

  • HTTP requests to GDPR plugin endpoints from unexpected sources
  • Increased traffic to /wp-admin/admin-ajax.php with plugin-specific actions

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/gdpr-compliance/" OR user_agent CONTAINS "GDPR") AND response_code=200

🔗 References

📤 Share & Export