CVE-2024-43973

4.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the GetPaid WordPress plugin that allows attackers to bypass access controls and perform unauthorized actions. It affects all GetPaid plugin versions up to 2.8.11. WordPress sites using vulnerable versions of this payment and invoicing plugin are at risk.

💻 Affected Systems

Products:
  • GetPaid WordPress Plugin
Versions: n/a through 2.8.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with GetPaid plugin enabled. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive payment data, modify invoices, manipulate payment records, or disrupt financial operations of affected WordPress sites.

🟠

Likely Case

Unauthorized users accessing administrative functions they shouldn't have permission to use, potentially viewing or modifying payment-related data.

🟢

If Mitigated

With proper access controls and authentication checks, the vulnerability would be prevented from being exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the WordPress site but bypasses authorization checks. The vulnerability is in access control logic rather than requiring complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.12 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/invoicing/wordpress-payment-forms-buy-now-buttons-and-invoicing-system-getpaid-plugin-2-8-11-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find GetPaid plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the GetPaid plugin until patched to prevent exploitation

wp plugin deactivate invoicing

Access Restriction via .htaccess

linux

Restrict access to GetPaid plugin directories

Add 'Deny from all' to .htaccess in /wp-content/plugins/invoicing/

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring of all access to GetPaid plugin functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → GetPaid version. If version is 2.8.11 or earlier, you are vulnerable.

Check Version:

wp plugin get invoicing --field=version

Verify Fix Applied:

Verify GetPaid plugin version is 2.8.12 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to GetPaid admin endpoints
  • Unusual user activity in payment/invoice management functions
  • Access from unexpected IP addresses to restricted plugin pages

Network Indicators:

  • HTTP requests to GetPaid admin endpoints from unauthorized users
  • Unusual patterns in /wp-admin/admin-ajax.php requests related to invoicing functions

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php?page=getpaid*" OR uri_path="/wp-admin/admin-ajax.php") AND user_role!="administrator" AND response_code=200

🔗 References

📤 Share & Export