CVE-2024-35669

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Bowo Debug Log Manager WordPress plugin. It allows unauthorized users to access debug log files that should be restricted. This affects all WordPress sites running Debug Log Manager versions up to and including 2.3.1.

💻 Affected Systems

Products:
  • Bowo Debug Log Manager WordPress Plugin
Versions: n/a through 2.3.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions. The vulnerability exists in the plugin's access control mechanisms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could access sensitive debug information containing system paths, configuration details, database credentials, or other sensitive data that could facilitate further attacks.

🟠

Likely Case

Attackers with basic WordPress knowledge could access debug logs containing potentially sensitive information about the WordPress installation and plugins.

🟢

If Mitigated

With proper authorization controls, only authenticated administrators could access debug logs, limiting exposure to trusted users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves broken access control, making exploitation straightforward for attackers who discover the unprotected endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/debug-log-manager/wordpress-debug-log-manager-plugin-2-3-1-broken-access-control-vulnerability-2

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Debug Log Manager' and click 'Update Now'. 4. Alternatively, download version 2.3.2+ from WordPress.org and replace the plugin files manually.

🔧 Temporary Workarounds

Disable Debug Log Manager Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate debug-log-manager

Restrict Access via .htaccess

linux

Block access to debug log manager endpoints

# Add to .htaccess in WordPress root:
<FilesMatch "debug-log-manager">
Order Deny,Allow
Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove the Debug Log Manager plugin entirely if updating is not possible
  • Implement web application firewall rules to block requests to debug-log-manager endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Debug Log Manager version. If version is 2.3.1 or earlier, you are vulnerable.

Check Version:

wp plugin get debug-log-manager --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.3.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/debug-log-manager/ endpoints
  • HTTP 200 responses to debug log manager URLs from unauthenticated users

Network Indicators:

  • GET requests to debug-log-manager endpoints without authentication cookies

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/debug-log-manager/*" AND NOT user_agent="WordPress/*"

🔗 References

📤 Share & Export