CVE-2024-4858

5.3 MEDIUM

📋 TL;DR

The Testimonial Carousel For Elementor WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to modify plugin settings. Specifically, attackers can update the OpenAI API key, which disables the AI-generated testimonial feature. This affects all WordPress sites using plugin versions up to 10.2.0.

💻 Affected Systems

Products:
  • Testimonial Carousel For Elementor WordPress Plugin
Versions: All versions up to and including 10.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers disable AI testimonial generation functionality, potentially disrupting website content automation and requiring manual intervention to restore functionality.

🟠

Likely Case

Attackers disable the OpenAI API integration, breaking the AI-generated testimonial feature until administrators notice and reconfigure the plugin.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to temporary service disruption that can be quickly detected and restored.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit as it requires no authentication and involves sending a crafted request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.1

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3092154/testimonials-carousel-elementor/trunk/class-testimonials-carousel-elementor.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Testimonial Carousel For Elementor'. 4. Click 'Update Now' if available, or download version 10.2.1+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate testimonials-carousel-elementor

Web Application Firewall Rule

all

Block requests to the vulnerable endpoint

Add WAF rule to block POST requests containing 'save_testimonials_option_callback'

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring for unauthorized configuration changes to the plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Testimonial Carousel For Elementor > Version. If version is 10.2.0 or lower, you are vulnerable.

Check Version:

wp plugin get testimonials-carousel-elementor --field=version

Verify Fix Applied:

After updating, verify plugin version shows 10.2.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action 'save_testimonials_option_callback' from unauthenticated users
  • Unauthorized plugin configuration changes in WordPress logs

Network Indicators:

  • Unusual POST requests to WordPress admin-ajax.php endpoint with specific parameter patterns

SIEM Query:

source="wordpress.log" AND "save_testimonials_option_callback" AND NOT user="authenticated"

🔗 References

📤 Share & Export