CVE-2024-4088

4.3 MEDIUM

📋 TL;DR

This vulnerability in the Attire Blocks WordPress plugin allows authenticated users with subscriber-level access or higher to modify plugin settings without proper authorization. It also lacks CSRF protection, enabling attackers to trick administrators into making unwanted changes. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Gutenberg Blocks and Page Layouts – Attire Blocks WordPress plugin
Versions: All versions up to and including 1.9.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Any authenticated user (subscriber role or higher) can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable critical plugin functionality, modify site behavior, or create persistent backdoors by altering plugin settings.

🟠

Likely Case

Malicious users could disrupt site functionality by changing plugin settings, potentially breaking frontend features or layouts.

🟢

If Mitigated

With proper user role management and CSRF protections, impact is limited to authorized administrative actions only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple. CSRF aspect allows exploitation via admin trickery.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.9.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3085600/attire-blocks/trunk/admin/AttireBlocksSettings.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Attire Blocks' and click 'Update Now' if available. 4. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate attire-blocks

User Role Restriction

linux

Temporarily restrict subscriber-level users from accessing the site

wp user list --role=subscriber --field=ID | xargs wp user set-role {ID} none

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests to the vulnerable endpoint
  • Enable strict user role management and audit all user accounts with subscriber or higher privileges

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Attire Blocks' version 1.9.2 or earlier

Check Version:

wp plugin get attire-blocks --field=version

Verify Fix Applied:

Verify plugin version is higher than 1.9.2 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=disable_fe_assets from non-admin users
  • Unauthorized modifications to plugin settings in WordPress logs

Network Indicators:

  • HTTP requests to admin-ajax.php with disable_fe_assets parameter from unexpected user roles

SIEM Query:

source="wordpress.log" AND "disable_fe_assets" AND (user_role="subscriber" OR user_role="contributor" OR user_role="author" OR user_role="editor")

🔗 References

📤 Share & Export