CVE-2024-37505

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Business One Page WordPress theme that allows attackers to exploit incorrectly configured access controls. Specifically, it enables unauthorized users to dismiss admin notices they shouldn't have access to. This affects all WordPress sites using Business One Page theme versions up to 1.2.9.

💻 Affected Systems

Products:
  • WordPress Business One Page Theme
Versions: n/a through 1.2.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations using the Business One Page theme. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate admin interface elements, potentially leading to privilege escalation or disruption of administrative functions.

🟠

Likely Case

Unauthorized users can dismiss admin notices, causing administrators to miss important notifications about site status, updates, or security alerts.

🟢

If Mitigated

With proper access controls, only authorized administrators can interact with admin notices, maintaining notification integrity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress access but not admin privileges. The vulnerability is documented with technical details in public advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.0 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/business-one-page/wordpress-business-one-page-theme-1-2-9-broken-access-control-on-notice-dismissal-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Business One Page theme is installed. 4. If version is 1.2.9 or earlier, update to 1.3.0+ via theme updates or manual upload. 5. Clear any caching plugins after update.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict access to notice dismissal endpoints via web server configuration

# For Apache: Add to .htaccess
<Files "admin-ajax.php">
    Require all denied
</Files>
# Then selectively allow only for admin paths

🧯 If You Can't Patch

  • Switch to a different WordPress theme temporarily
  • Implement web application firewall rules to block unauthorized access to admin-ajax.php endpoints related to notice dismissal

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Appearance > Themes > Business One Page theme details. If version is 1.2.9 or earlier, you are vulnerable.

Check Version:

# In WordPress root directory
grep -r "Version:" wp-content/themes/business-one-page/style.css

Verify Fix Applied:

After updating, verify theme version shows 1.3.0 or later in WordPress admin panel. Test notice dismissal functionality with non-admin user accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to admin-ajax.php with 'action' parameter containing notice dismissal functions
  • Failed authorization attempts for admin functions from non-admin users

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with notice-related actions from non-admin IPs

SIEM Query:

source="wordpress.log" AND (url_path="/wp-admin/admin-ajax.php" AND http_method="POST" AND user_role!="administrator" AND form_data CONTAINS "notice_dismiss")

🔗 References

📤 Share & Export