CVE-2024-3607

4.3 MEDIUM

📋 TL;DR

The PropertyHive WordPress plugin has a missing capability check in the delete_key_date() function, allowing authenticated users with subscriber-level access or higher to delete arbitrary posts. This affects all versions up to and including 2.0.12. Any WordPress site using the vulnerable plugin is at risk of unauthorized data deletion.

💻 Affected Systems

Products:
  • PropertyHive WordPress Plugin
Versions: All versions up to and including 2.0.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with PropertyHive plugin installed. Any authenticated user (subscriber or higher) can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could delete critical content, causing data loss, site disruption, and potential business impact.

🟠

Likely Case

Subscriber-level users exploiting the vulnerability to delete posts they shouldn't have access to, leading to content management issues.

🟢

If Mitigated

Minimal impact if proper user access controls and backups are in place, with only authorized deletions occurring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.13 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3075163%40propertyhive&new=3075163%40propertyhive&sfp_email=&sfph_mail=#file11

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find PropertyHive and update to version 2.0.13 or later. 4. Alternatively, download the latest version from WordPress plugin repository and replace the plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the PropertyHive plugin until patched to prevent exploitation.

wp plugin deactivate propertyhive

Restrict User Registration

all

Temporarily disable new user registration to limit potential attackers.

In WordPress Settings > General, uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement strict user access controls and monitor for suspicious deletion activity.
  • Ensure regular backups are taken and tested to recover from potential data loss.

🔍 How to Verify

Check if Vulnerable:

Check the PropertyHive plugin version in WordPress admin under Plugins > Installed Plugins. If version is 2.0.12 or lower, it is vulnerable.

Check Version:

wp plugin get propertyhive --field=version

Verify Fix Applied:

After updating, verify the plugin version is 2.0.13 or higher in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual post deletion events by non-admin users in WordPress logs
  • Multiple DELETE requests to wp-admin/admin-ajax.php with action=delete_key_date

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with delete_key_date action from non-admin user accounts

SIEM Query:

source="wordpress.log" AND (action="delete_key_date" OR message="*deleted post*" AND user_role!="administrator")

🔗 References

📤 Share & Export