CVE-2024-50419

5.4 MEDIUM

📋 TL;DR

This CVE describes an incorrect authorization vulnerability in the Greenshift WordPress plugin that allows attackers to bypass access controls. It affects all WordPress sites using Greenshift animation and page builder blocks up to version 9.7. Attackers could potentially access restricted functionality or data they shouldn't have permission to view.

💻 Affected Systems

Products:
  • Greenshift – animation and page builder blocks WordPress plugin
Versions: All versions up to and including 9.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Greenshift plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings, inject malicious content, or access administrative functions leading to site compromise.

🟠

Likely Case

Unauthorized users accessing restricted plugin features or configuration options they shouldn't have permission to use.

🟢

If Mitigated

Proper WordPress user role management and security plugins could limit the impact to minor functionality access.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and this vulnerability affects access control mechanisms.
🏢 Internal Only: LOW - This primarily affects web-facing WordPress installations, not internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the WordPress site, but the vulnerability is in access control mechanisms making it relatively easy to exploit once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9.8 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/greenshift-animation-and-page-builder-blocks/wordpress-greenshift-animation-and-page-builder-blocks-plugin-9-7-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Greenshift – animation and page builder blocks'. 4. Click 'Update Now' if available, or download version 9.8+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Greenshift plugin until patched

wp plugin deactivate greenshift-animation-and-page-builder-blocks

Restrict User Roles

all

Limit administrative access and review user permissions

🧯 If You Can't Patch

  • Remove the Greenshift plugin completely and use alternative page builder solutions
  • Implement web application firewall rules to block suspicious access patterns to Greenshift endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Greenshift version. If version is 9.7 or lower, you are vulnerable.

Check Version:

wp plugin get greenshift-animation-and-page-builder-blocks --field=version

Verify Fix Applied:

Verify Greenshift plugin version is 9.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to Greenshift admin endpoints by non-admin users
  • Failed authorization attempts on Greenshift functions

Network Indicators:

  • HTTP requests to /wp-content/plugins/greenshift-animation-and-page-builder-blocks/ with suspicious parameters

SIEM Query:

source="wordpress" AND (uri_path="*greenshift*" AND (user_role!="administrator" OR auth_failure=true))

🔗 References

📤 Share & Export