CVE-2024-37204

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the PropertyHive WordPress plugin that allows attackers to exploit incorrectly configured access control security levels. It affects all PropertyHive plugin versions up to and including 2.0.9, potentially allowing unauthorized users to access restricted functionality or data.

💻 Affected Systems

Products:
  • PropertyHive WordPress Plugin
Versions: n/a through 2.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with PropertyHive plugin installed. The vulnerability exists in the plugin's access control implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify property listings, access sensitive user data, or perform administrative actions without proper authorization, potentially leading to data manipulation or privilege escalation.

🟠

Likely Case

Unauthorized users accessing property management functions they shouldn't have access to, potentially viewing or modifying property data.

🟢

If Mitigated

Proper access controls would prevent unauthorized access, limiting impact to legitimate users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of the plugin's functionality but doesn't require advanced technical skills once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.10 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-9-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find PropertyHive plugin
4. Click 'Update Now' if update available
5. If no update available, download latest version from WordPress repository
6. Deactivate old plugin
7. Upload and activate new version

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the PropertyHive plugin until patched

wp plugin deactivate propertyhive

Access Restriction via .htaccess

linux

Restrict access to PropertyHive plugin directories

# Add to .htaccess in propertyhive plugin directory:
Order Deny,Allow
Deny from all
Allow from 127.0.0.1

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to PropertyHive functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > PropertyHive version. If version is 2.0.9 or earlier, system is vulnerable.

Check Version:

wp plugin get propertyhive --field=version

Verify Fix Applied:

Verify PropertyHive plugin version is 2.0.10 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to PropertyHive admin endpoints
  • Multiple failed authentication attempts followed by PropertyHive API calls

Network Indicators:

  • Unusual traffic patterns to /wp-content/plugins/propertyhive/ endpoints
  • Requests to PropertyHive admin functions from unauthorized IPs

SIEM Query:

source="wordpress.log" AND ("propertyhive" OR "PropertyHive") AND ("admin" OR "wp-admin") AND status=200 AND user="unauthenticated"

🔗 References

📤 Share & Export