CVE-2024-34753

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the SoftLab Radio Player WordPress plugin, allowing unauthorized users to perform actions intended for administrators. It affects all versions up to 2.0.73, potentially compromising sites using this plugin. The issue stems from broken access control mechanisms.

💻 Affected Systems

Products:
  • SoftLab Radio Player WordPress plugin
Versions: n/a through 2.0.73
Operating Systems: All OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions; no specific configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative privileges, modify plugin settings, inject malicious content, or disrupt radio streaming functionality, leading to site compromise or defacement.

🟠

Likely Case

Unauthorized users may access restricted plugin features, such as changing radio station configurations or viewing sensitive data, without proper authentication.

🟢

If Mitigated

With proper authorization checks, only authenticated administrators can access plugin functions, limiting impact to minor configuration errors.

🌐 Internet-Facing: HIGH, as WordPress sites are typically internet-facing, making them directly accessible to attackers exploiting this vulnerability.
🏢 Internal Only: LOW, as the plugin is designed for web use and not typically deployed in isolated internal networks without internet exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation likely involves simple HTTP requests to bypass authorization; no authentication needed, making it easy for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.74 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/radio-player/wordpress-radio-player-plugin-2-0-73-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Radio Player' and update to version 2.0.74 or higher. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Radio Player plugin to prevent exploitation until patched.

wp plugin deactivate radio-player

🧯 If You Can't Patch

  • Restrict access to the WordPress admin interface using IP whitelisting or firewall rules.
  • Monitor logs for unauthorized access attempts to plugin endpoints and implement web application firewall (WAF) rules to block suspicious requests.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 2.0.73 or lower, it is vulnerable.

Check Version:

wp plugin get radio-player --field=version

Verify Fix Applied:

After updating, confirm the plugin version is 2.0.74 or higher in the same location and test authorization controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to Radio Player plugin endpoints from unauthorized IPs or user agents
  • Failed authorization attempts in WordPress logs

Network Indicators:

  • HTTP traffic to /wp-content/plugins/radio-player/ paths without authentication headers

SIEM Query:

source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" OR uri CONTAINS "radio-player") AND status=200 AND user="unauthenticated"

🔗 References

📤 Share & Export