CVE-2024-4390

6.5 MEDIUM

📋 TL;DR

The Depicter WordPress plugin allows authenticated attackers with contributor-level access or higher to generate valid nonces for any WordPress action. This vulnerability enables privilege escalation by bypassing nonce-based security checks. All WordPress sites using Depicter versions up to 3.0.2 are affected.

💻 Affected Systems

Products:
  • Depicter - Slider and Carousel slider by Depicter
Versions: All versions up to and including 3.0.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Depicter plugin and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary WordPress functions, potentially leading to complete site takeover, data theft, or malware injection.

🟠

Likely Case

Privilege escalation allowing contributors to perform administrator-only actions like plugin/theme installation, user management, or content modification.

🟢

If Mitigated

Limited impact if proper role-based access controls and additional security layers are implemented beyond nonce checks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a publicly accessible AJAX endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.3

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3103357%40depicter%2Ftrunk&old=3090538%40depicter%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Depicter plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.0.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Depicter Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate depicter

Restrict Contributor Access

all

Remove contributor roles from untrusted users or limit contributor capabilities.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to vulnerable AJAX endpoints
  • Monitor for suspicious nonce generation attempts and contributor-level user activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Depicter version. If version is 3.0.2 or lower, you are vulnerable.

Check Version:

wp plugin get depicter --field=version

Verify Fix Applied:

Verify Depicter plugin version is 3.0.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action=depicter_security
  • Contributor users performing administrative actions
  • Multiple nonce generation requests from single user

Network Indicators:

  • POST requests to admin-ajax.php with depicter_security parameters
  • Unusual nonce values in WordPress requests

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" AND "depicter_security")

🔗 References

📤 Share & Export