CVE-2024-43298
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the WordPress Clone plugin (Migrate Clone) that allows attackers to exploit incorrectly configured access control security levels. It affects all versions up to 2.4.5, potentially allowing unauthorized users to access functionality intended only for administrators. WordPress sites using this vulnerable plugin are affected.
💻 Affected Systems
- WordPress Clone by WP Academy (Migrate Clone plugin)
📦 What is this software?
Clone by Backupbliss
⚠️ Risk & Real-World Impact
Worst Case
Attackers could gain administrative access to the WordPress site, modify content, install malicious plugins/themes, or take full control of the website.
Likely Case
Unauthorized users accessing clone/backup functionality, potentially exposing sensitive site data or configuration information.
If Mitigated
With proper access controls and authentication requirements, the vulnerability would be prevented from being exploited.
🎯 Exploit Status
Missing authorization vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.6 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/wp-clone-by-wp-academy/wordpress-clone-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Clone' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Clone plugin until patched
wp plugin deactivate wp-clone-by-wp-academy
Restrict plugin access via .htaccess
linuxAdd access restrictions to plugin directory
# Add to .htaccess in wp-content/plugins/wp-clone-by-wp-academy/
Order deny,allow
Deny from all
🧯 If You Can't Patch
- Implement strict network access controls to limit who can access the WordPress admin interface
- Enable WordPress security plugins that monitor for unauthorized access attempts and implement additional authentication layers
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Clone' version. If version is 2.4.5 or earlier, you are vulnerable.
Check Version:
wp plugin get wp-clone-by-wp-academy --field=version
Verify Fix Applied:
Verify plugin version is 2.4.6 or later in WordPress admin panel. Test clone functionality with non-admin user to confirm access is properly restricted.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to clone/backup endpoints
- Non-admin users accessing /wp-admin/admin-ajax.php with clone-related actions
- Failed authentication attempts followed by successful clone operations
Network Indicators:
- HTTP requests to clone endpoints from unauthorized IPs
- Unusual traffic patterns to /wp-content/plugins/wp-clone-by-wp-academy/
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND action="clone" OR uri_path CONTAINS "/wp-content/plugins/wp-clone-by-wp-academy/") AND user_role!="administrator"