CVE-2024-38761

7.5 HIGH

📋 TL;DR

The Zephyr Project Manager WordPress plugin versions up to 3.3.99 contain a vulnerability that exposes sensitive information via export files. This allows unauthorized actors to access potentially confidential data. All WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • Zephyr Project Manager WordPress Plugin
Versions: n/a through 3.3.99
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate all project data, user information, and potentially other sensitive WordPress data stored by the plugin, leading to data breach and compliance violations.

🟠

Likely Case

Unauthenticated users accessing export functionality could download project details, task lists, user assignments, and other business-sensitive information.

🟢

If Mitigated

With proper access controls and monitoring, exposure would be limited to authorized users only, preventing data leakage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves accessing export functionality without proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.0 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-99-sensitive-data-exposure-via-export-file-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Zephyr Project Manager. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.4.0+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate zephyr-project-manager

Restrict Access

linux

Use web application firewall or .htaccess to block access to plugin export endpoints

# Add to .htaccess: RewriteRule ^wp-content/plugins/zephyr-project-manager/.*export.*$ - [F,L]

🧯 If You Can't Patch

  • Implement strict access controls to limit plugin functionality to authenticated administrators only
  • Monitor web server logs for unauthorized access attempts to plugin export endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Zephyr Project Manager version. If version is 3.3.99 or lower, you are vulnerable.

Check Version:

wp plugin get zephyr-project-manager --field=version

Verify Fix Applied:

After updating, verify plugin version shows 3.4.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/zephyr-project-manager/*export* endpoints from unauthorized IPs
  • Large file downloads from plugin directories

Network Indicators:

  • Unusual outbound traffic containing structured project data
  • Requests to export endpoints without proper authentication headers

SIEM Query:

source="web_server" AND (uri="*zephyr-project-manager*export*" OR uri="*wp-content/plugins/zephyr-project-manager*") AND NOT user_agent="*admin*"

🔗 References

📤 Share & Export