CVE-2024-38690

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the iPanorama 360 WordPress plugin that allows attackers to access functionality not properly constrained by access controls. Attackers can perform actions they shouldn't be authorized to do, potentially modifying or accessing virtual tour content. All WordPress sites using iPanorama 360 versions up to 1.8.3 are affected.

💻 Affected Systems

Products:
  • Avirtum iPanorama 360 WordPress Virtual Tour Builder
Versions: n/a through 1.8.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify or delete virtual tours, inject malicious content, or potentially escalate privileges within the WordPress environment.

🟠

Likely Case

Attackers could modify existing virtual tours, inject advertising or malicious links, or deface tour content without proper authorization.

🟢

If Mitigated

With proper network segmentation and WordPress hardening, impact would be limited to the plugin's functionality without affecting core WordPress or other plugins.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress access but not necessarily admin privileges. The vulnerability is in access control logic, making exploitation straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ipanorama-360-virtual-tour-builder-lite/wordpress-ipanorama-360-plugin-1-8-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find iPanorama 360 Virtual Tour Builder. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.8.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the iPanorama 360 plugin until patched

wp plugin deactivate ipanorama-360-virtual-tour-builder-lite

Restrict plugin access

all

Use WordPress role management to restrict who can access plugin functionality

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the WordPress admin interface
  • Enable WordPress security plugins that monitor for unauthorized access attempts and block suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins, look for iPanorama 360 version number

Check Version:

wp plugin get ipanorama-360-virtual-tour-builder-lite --field=version

Verify Fix Applied:

Verify plugin version is 1.8.4 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to iPanorama endpoints
  • Unexpected modifications to virtual tour content
  • Access from unauthorized user roles to plugin functions

Network Indicators:

  • Unusual traffic patterns to /wp-content/plugins/ipanorama-360/ endpoints
  • POST requests to plugin admin functions from non-admin users

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters CONTAINS "ipanorama" AND user_role!="administrator")

🔗 References

📤 Share & Export