CVE-2024-38775

7.2 HIGH

📋 TL;DR

This vulnerability in the CTX Feed WordPress plugin allows attackers to update arbitrary WordPress options due to improper privilege management. It enables privilege escalation from lower-privileged user accounts to administrative access. All WordPress sites using CTX Feed versions up to 6.5.6 are affected.

💻 Affected Systems

Products:
  • WebAppick CTX Feed (WordPress plugin)
Versions: n/a through 6.5.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least one user account with some level of WordPress access (subscriber or higher).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress site, allowing them to install backdoors, steal data, deface the site, or pivot to other systems.

🟠

Likely Case

Attackers escalate privileges to administrator level and modify site settings, inject malicious code, or create new admin accounts.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to unauthorized option changes that can be detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but with minimal privileges. Public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/webappick-product-feed-for-woocommerce/wordpress-ctx-feed-plugin-6-5-6-arbitrary-options-update-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find CTX Feed and click 'Update Now'. 4. Verify version is 6.5.7 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate CTX Feed plugin until patched

wp plugin deactivate webappick-product-feed-for-woocommerce

Restrict user roles

all

Limit user accounts to only necessary roles and review all user permissions

🧯 If You Can't Patch

  • Implement strict user access controls and monitor for privilege escalation attempts
  • Deploy web application firewall rules to block option modification requests from non-admin users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > CTX Feed version. If version is 6.5.6 or lower, you are vulnerable.

Check Version:

wp plugin get webappick-product-feed-for-woocommerce --field=version

Verify Fix Applied:

Verify CTX Feed version is 6.5.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized option update attempts in WordPress logs
  • User role changes from non-admin to admin
  • wp_options table modifications from non-admin users

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with action=webappick_update_feed_option from non-admin users

SIEM Query:

source="wordpress.log" AND ("update_option" OR "admin-ajax.php") AND user_role!="administrator"

🔗 References

📤 Share & Export