CVE-2024-43332

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Jordy Meow Photo Engine WordPress plugin that allows attackers to bypass access controls. It affects all versions up to and including 6.4.0, potentially exposing sensitive photo data to unauthorized users.

💻 Affected Systems

Products:
  • Jordy Meow Photo Engine WordPress Plugin
Versions: All versions up to and including 6.4.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Photo Engine plugin installed and active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could access, modify, or delete all photos managed by the plugin, potentially including sensitive or private images.

🟠

Likely Case

Unauthorized users accessing photos they shouldn't have permission to view, leading to data exposure.

🟢

If Mitigated

Minimal impact with proper access controls and authentication mechanisms in place.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability allows bypassing access controls.
🏢 Internal Only: MEDIUM - Internal users could still exploit the vulnerability if they have network access to the WordPress instance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation likely requires some level of access to the WordPress instance, but the vulnerability makes authorization checks insufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wplr-sync/wordpress-photo-engine-plugin-6-4-0-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'Photo Engine' plugin
4. Click 'Update Now' if update is available
5. Alternatively, download version 6.4.1+ from WordPress repository and manually update

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Photo Engine plugin until patched

wp plugin deactivate wplr-sync

Restrict Access

all

Implement additional access controls at web server level

# Add to .htaccess for Apache:
<Files "photo-engine*">
Require valid-user
</Files>
# Add to nginx config:
location ~ /wp-content/plugins/wplr-sync/ {
    auth_basic "Restricted";
    auth_basic_user_file /etc/nginx/.htpasswd;
}

🧯 If You Can't Patch

  • Disable the Photo Engine plugin completely
  • Implement network segmentation to isolate the WordPress instance from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Photo Engine version. If version is 6.4.0 or lower, you are vulnerable.

Check Version:

wp plugin get wplr-sync --field=version

Verify Fix Applied:

Verify plugin version is 6.4.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to photo-related endpoints
  • Failed authorization attempts followed by successful access to photo resources
  • Access to /wp-content/plugins/wplr-sync/ from unauthorized users

Network Indicators:

  • HTTP requests to Photo Engine API endpoints without proper authentication headers
  • Unusual traffic patterns to photo upload/download endpoints

SIEM Query:

source="wordpress.log" AND ("wplr-sync" OR "photo-engine") AND (response_code=200 OR response_code=201) AND user="unauthenticated"

🔗 References

📤 Share & Export