CVE-2024-38792

5.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the ConveyThis Translate plugin for WordPress. It allows attackers to access functionality not properly constrained by access controls, potentially modifying plugin settings. All WordPress sites using affected versions of the ConveyThis Translate plugin are vulnerable.

💻 Affected Systems

Products:
  • ConveyThis Translate Team Language Translate Widget for WordPress
Versions: All versions up to and including 234
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the ConveyThis Translate plugin enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin configuration, potentially disrupting translation services or altering website behavior for all visitors.

🟠

Likely Case

Unauthorized users could change plugin settings, affecting translation functionality or website appearance.

🟢

If Mitigated

With proper authorization controls, only authenticated administrators could modify plugin settings.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows access to functionality without proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 234

Vendor Advisory: https://patchstack.com/database/vulnerability/conveythis-translate/wordpress-conveythis-translate-plugin-234-non-arbitrary-options-update-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ConveyThis Translate plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download latest version from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the ConveyThis Translate plugin until patched

wp plugin deactivate conveythis-translate

🧯 If You Can't Patch

  • Implement web application firewall rules to block unauthorized access to plugin endpoints
  • Restrict access to WordPress admin functions using IP whitelisting

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for ConveyThis Translate version 234 or earlier

Check Version:

wp plugin get conveythis-translate --field=version

Verify Fix Applied:

Verify plugin version is greater than 234 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to ConveyThis plugin endpoints
  • Unexpected changes to plugin settings

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with ConveyThis-specific actions

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND action="conveythis_*")

🔗 References

📤 Share & Export