CVE-2024-35672
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Netgsm WordPress plugin that allows unauthorized users to perform privileged actions. It affects all WordPress sites running Netgsm plugin versions up to 2.9.19. Attackers can exploit this to manipulate SMS functionality or access sensitive data.
💻 Affected Systems
- WordPress Netgsm Plugin
📦 What is this software?
Netgsm by Netgsm
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of SMS functionality allowing unauthorized SMS sending, billing manipulation, or data exfiltration from connected systems.
Likely Case
Unauthorized users sending SMS messages at the site owner's expense or accessing SMS-related data.
If Mitigated
Limited impact with proper network segmentation and strong authentication controls in place.
🎯 Exploit Status
Missing authorization vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.9.20 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/netgsm/wordpress-netgsm-plugin-2-9-16-broken-access-control-vulnerability-2?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Netgsm plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.9.20+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable Netgsm Plugin
allTemporarily deactivate the vulnerable plugin until patching is possible.
wp plugin deactivate netgsm
Restrict Access via Web Application Firewall
allBlock access to Netgsm plugin endpoints using WAF rules.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the WordPress instance
- Enable detailed logging and monitoring for unauthorized access attempts to Netgsm endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for Netgsm version. If version is 2.9.19 or lower, you are vulnerable.
Check Version:
wp plugin get netgsm --field=version
Verify Fix Applied:
After updating, verify Netgsm plugin version shows 2.9.20 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized POST requests to /wp-admin/admin-ajax.php with netgsm-related actions
- Unexpected SMS sending activity in Netgsm logs
Network Indicators:
- Unusual outbound SMS traffic patterns
- Requests to Netgsm API endpoints from unauthorized IPs
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php") AND (action="*netgsm*") AND user="unauthenticated"