CVE-2024-43982

8.8 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WordPress Login As Users plugin that allows attackers to bypass access controls and impersonate other users. The vulnerability affects all versions up to 1.4.3, enabling account takeover attacks on WordPress sites using this plugin.

💻 Affected Systems

Products:
  • WordPress Login As Users plugin
Versions: n/a through 1.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through administrative account takeover, leading to data theft, malware injection, defacement, or ransomware deployment.

🟠

Likely Case

Unauthorized access to user accounts, privilege escalation, session hijacking, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.4

Vendor Advisory: https://patchstack.com/database/vulnerability/login-as-users/wordpress-login-as-users-plugin-1-4-3-broken-access-control-to-account-takeover-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update WordPress Login As Users plugin to version 1.4.4 or later. 2. Log into WordPress admin panel. 3. Navigate to Plugins > Installed Plugins. 4. Find Login As Users plugin and click Update Now. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Login As Users plugin until patching is possible

wp plugin deactivate login-as-users

Restrict plugin access

all

Use web application firewall rules to block access to plugin functionality

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WordPress installation
  • Enable detailed logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Login As Users version

Check Version:

wp plugin get login-as-users --field=version

Verify Fix Applied:

Verify plugin version is 1.4.4 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user switching patterns
  • Multiple failed login attempts followed by successful login from different IP
  • Administrative actions from non-admin accounts

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with login_as_user parameters
  • Unusual spikes in admin panel traffic

SIEM Query:

source="wordpress.log" AND ("login_as_user" OR "switched_to_user")

🔗 References

📤 Share & Export