CVE-2024-49328

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in the WP REST API FNS WordPress plugin, potentially gaining unauthorized access to administrative functions. It affects all WordPress sites running the plugin version 1.0.0 or earlier. Attackers could exploit this to take over accounts or perform unauthorized actions.

💻 Affected Systems

Products:
  • WordPress WP REST API FNS plugin
Versions: n/a through 1.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative privileges, modify content, install backdoors, steal sensitive data, or deface the website.

🟠

Likely Case

Unauthorized access to user accounts, privilege escalation, data theft, or content manipulation by attackers exploiting the authentication bypass.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once the attack vector is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/rest-api-fns/wordpress-wp-rest-api-fns-plugin-plugin-1-0-0-account-takeover-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP REST API FNS' plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 1.0.1+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the WP REST API FNS plugin until patched

wp plugin deactivate rest-api-fns

Restrict API access

all

Use web application firewall to block suspicious REST API requests

🧯 If You Can't Patch

  • Disable the WP REST API FNS plugin immediately
  • Implement strict network access controls and monitor for unauthorized API requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'WP REST API FNS' version 1.0.0 or earlier

Check Version:

wp plugin get rest-api-fns --field=version

Verify Fix Applied:

Verify plugin version is 1.0.1 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API authentication attempts
  • Multiple failed login attempts followed by successful authentication from same IP
  • Administrative actions from unexpected user accounts

Network Indicators:

  • Suspicious POST/GET requests to /wp-json/fns/ endpoints
  • Authentication bypass attempts in HTTP headers or parameters

SIEM Query:

source="wordpress.log" AND ("rest-api-fns" OR "fns/" OR "authentication bypass")

🔗 References

📤 Share & Export