CVE-2024-35716

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Copymatic WordPress plugin that allows unauthorized users to perform actions intended only for authorized users. It affects all WordPress sites running Copymatic plugin versions up to 1.9. The vulnerability enables broken access control where users can bypass intended authorization checks.

💻 Affected Systems

Products:
  • Copymatic – AI Content Writer & Generator WordPress plugin
Versions: n/a through 1.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access administrative functions, modify plugin settings, or potentially access sensitive user data stored by the plugin.

🟠

Likely Case

Unauthorized users could modify plugin configurations, access user-generated content, or perform actions reserved for authenticated users.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact would be limited to the WordPress application layer only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.10 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/copymatic/wordpress-copymatic-plugin-1-9-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Copymatic plugin and click 'Update Now'
4. Verify plugin version is 1.10 or higher

🔧 Temporary Workarounds

Disable Copymatic Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate copymatic

Restrict Access via Web Application Firewall

all

Block access to Copymatic plugin endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable WordPress security plugins that monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Copymatic version. If version is 1.9 or lower, you are vulnerable.

Check Version:

wp plugin get copymatic --field=version

Verify Fix Applied:

Verify Copymatic plugin version is 1.10 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Copymatic plugin endpoints
  • Unusual user activity from non-admin accounts accessing plugin functions

Network Indicators:

  • HTTP requests to /wp-content/plugins/copymatic/ endpoints from unauthorized sources

SIEM Query:

source="wordpress" AND (uri_path="/wp-content/plugins/copymatic/*" AND user_role!="administrator")

🔗 References

📤 Share & Export