CVE-2024-37119

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to reset license settings in Uncanny Automator Pro WordPress plugin. It affects all WordPress sites running Uncanny Automator Pro versions up to 5.3.0.0, potentially disrupting automated workflows and business processes.

💻 Affected Systems

Products:
  • Uncanny Automator Pro WordPress Plugin
Versions: All versions up to and including 5.3.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Uncanny Automator Pro (paid version), not the free version. Requires WordPress installation with the plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable all automated workflows, disrupt business operations, and potentially gain unauthorized access to connected systems through broken automation chains.

🟠

Likely Case

Attackers reset license settings, causing automated workflows to stop functioning until reconfiguration, leading to operational disruption.

🟢

If Mitigated

With proper network segmentation and web application firewalls, impact is limited to temporary workflow disruption requiring reconfiguration.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and this is an unauthenticated vulnerability affecting a popular plugin.
🏢 Internal Only: MEDIUM - Internal WordPress installations could still be affected if attackers gain internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with technical details, making exploitation straightforward for attackers with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.0.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/uncanny-automator-pro/wordpress-uncanny-automator-pro-plugin-5-3-unauthenticated-license-settings-reset-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Uncanny Automator Pro and click 'Update Now'. 4. Verify version is 5.3.0.1 or higher.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests to vulnerable endpoints using WAF rules

Block POST requests to /wp-admin/admin-ajax.php with action parameter containing 'license' or 'automator'

Temporary Plugin Deactivation

linux

Disable Uncanny Automator Pro until patched

wp plugin deactivate uncanny-automator-pro

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to WordPress admin interface
  • Deploy web application firewall with rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Uncanny Automator Pro → Version. If version is 5.3.0.0 or lower, you are vulnerable.

Check Version:

wp plugin get uncanny-automator-pro --field=version

Verify Fix Applied:

After updating, verify version shows 5.3.0.1 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action parameters like 'license_reset', 'automator_license'
  • Unusual license reset events in WordPress logs

Network Indicators:

  • HTTP POST requests to WordPress admin-ajax endpoint with license-related parameters from unauthorized IPs

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" AND ("license" OR "automator")) AND status=200

🔗 References

📤 Share & Export