CVE-2024-39633

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users with 'contributor' role or higher to escalate their privileges to administrator level in WordPress sites using PowerPack for Beaver Builder. It affects all WordPress installations with this plugin installed, potentially compromising the entire site.

💻 Affected Systems

Products:
  • PowerPack for Beaver Builder WordPress Plugin
Versions: All versions up to and including 2.33.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with PowerPack plugin active. Any authenticated user with at least contributor role can exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress site, allowing them to install malicious plugins/themes, modify content, steal data, or establish persistent backdoors.

🟠

Likely Case

Authenticated attackers (including compromised contributor accounts) elevate privileges to administrator and perform unauthorized actions like content modification or plugin installation.

🟢

If Mitigated

With proper role-based access controls and monitoring, impact is limited to detection and remediation of unauthorized privilege changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.33.1

Vendor Advisory: https://patchstack.com/database/vulnerability/bbpowerpack/wordpress-powerpack-for-beaver-builder-plugin-2-33-0-contributor-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'PowerPack for Beaver Builder'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.33.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable PowerPack Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate bbpowerpack

Restrict User Roles

all

Temporarily remove contributor roles or restrict user registration

🧯 If You Can't Patch

  • Implement strict monitoring of user role changes and admin actions
  • Apply network segmentation to isolate WordPress instance from critical systems

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → PowerPack for Beaver Builder version. If version is 2.33.0 or lower, system is vulnerable.

Check Version:

wp plugin get bbpowerpack --field=version

Verify Fix Applied:

Confirm PowerPack plugin version is 2.33.1 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user role changes from contributor to administrator
  • Multiple failed privilege escalation attempts in WordPress logs
  • Unusual plugin activation/modification by non-admin users

Network Indicators:

  • Unusual admin panel access patterns from non-admin IPs
  • Increased POST requests to user/role management endpoints

SIEM Query:

source="wordpress" AND (event="user_role_change" OR event="capabilities_modified") AND user_role="contributor" AND new_role="administrator"

🔗 References

📤 Share & Export