CVE-2024-47318

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Magazine3 PWA for WP & AMP WordPress plugin that allows attackers to exploit incorrectly configured access control security levels. The vulnerability affects all versions up to 1.7.72, potentially allowing unauthorized access to functionality that should be restricted.

💻 Affected Systems

Products:
  • Magazine3 PWA for WP & AMP WordPress Plugin
Versions: All versions up to and including 1.7.72
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. The vulnerability exists in the plugin's access control implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized administrative access, modify plugin settings, or access sensitive WordPress functionality that should be restricted to authenticated users.

🟠

Likely Case

Unauthorized users could access plugin configuration pages or functionality intended only for authenticated users, potentially modifying PWA settings or accessing restricted data.

🟢

If Mitigated

With proper access controls and authentication checks, the vulnerability would be prevented as all requests would be properly authorized before processing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves missing authorization checks, which typically means attackers can access restricted endpoints without proper authentication. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.73 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/pwa-for-wp/wordpress-pwa-for-wp-amp-plugin-1-7-72-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'PWA for WP & AMP' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.7.73+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate pwa-for-wp

Restrict Access via Web Server

all

Configure web server to restrict access to plugin admin pages

# Add to .htaccess for Apache:
<FilesMatch "pwa-for-wp">
Order Deny,Allow
Deny from all
</FilesMatch>
# Add to nginx config:
location ~* /wp-content/plugins/pwa-for-wp {
    deny all;
}

🧯 If You Can't Patch

  • Disable the PWA for WP & AMP plugin immediately
  • Implement web application firewall rules to block access to plugin-specific endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'PWA for WP & AMP' version. If version is 1.7.72 or lower, you are vulnerable.

Check Version:

wp plugin get pwa-for-wp --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.7.73 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-admin/admin.php?page=pwaforwp or similar plugin admin pages
  • 403 errors followed by successful 200 responses to plugin endpoints

Network Indicators:

  • HTTP requests to plugin admin endpoints without proper authentication cookies or tokens

SIEM Query:

source="web_access_logs" AND (uri="*pwaforwp*" OR uri="*pwa-for-wp*") AND status=200 AND NOT (user_agent="*wp-admin*" OR cookie="*wordpress_logged_in*")

🔗 References

📤 Share & Export