CVE-2024-37952
📋 TL;DR
This vulnerability allows attackers with subscriber-level access in WordPress to escalate their privileges to administrator level in the BookYourTravel theme. It affects all WordPress sites using BookYourTravel theme versions up to 8.18.17. Attackers can gain full control of affected WordPress installations.
💻 Affected Systems
- WordPress BookYourTravel Theme
📦 What is this software?
Book Your Travel by Themeenergy
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of WordPress site with attacker gaining administrator privileges, allowing installation of malware, data theft, defacement, and persistence.
Likely Case
Attackers with subscriber accounts (easily created) escalate to admin and take over the site for malicious purposes.
If Mitigated
With proper access controls and monitoring, privilege escalation attempts can be detected and blocked before full compromise.
🎯 Exploit Status
Exploitation requires subscriber-level access, which can be obtained through registration on sites allowing user registration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.18.18 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/bookyourtravel/wordpress-bookyourtravel-theme-8-18-17-subscriber-privilege-escalation-vulnerability
Restart Required: No
Instructions:
1. Update BookYourTravel theme to version 8.18.18 or later via WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Click 'Update Now' on BookYourTravel theme. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable User Registration
allPrevent new user registration to block attackers from obtaining subscriber accounts needed for exploitation.
Navigate to WordPress Settings > General and uncheck 'Anyone can register'
Temporary Theme Deactivation
allSwitch to default WordPress theme until patch can be applied.
Navigate to Appearance > Themes, activate default theme (Twenty Twenty-Four)
🧯 If You Can't Patch
- Implement strict user role monitoring and alert on privilege changes
- Apply web application firewall rules to block privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Appearance > Themes for BookYourTravel theme version 8.18.17 or earlier.
Check Version:
wp theme list --field=name,status,version | grep bookyourtravel
Verify Fix Applied:
Confirm BookYourTravel theme version is 8.18.18 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- User role changes from subscriber to administrator
- Unauthorized access to admin functions by non-admin users
Network Indicators:
- HTTP POST requests to user role modification endpoints from non-admin accounts
SIEM Query:
source="wordpress" (event="user_role_change" OR event="capabilities_modified") AND (old_role="subscriber" AND new_role="administrator")
🔗 References
- https://patchstack.com/database/vulnerability/bookyourtravel/wordpress-bookyourtravel-theme-8-18-17-subscriber-privilege-escalation-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/bookyourtravel/wordpress-bookyourtravel-theme-8-18-17-subscriber-privilege-escalation-vulnerability?_s_id=cve