CVE-2024-50477

9.8 CRITICAL

📋 TL;DR

This CVE describes an authentication bypass vulnerability in the Stacks Mobile App Builder WordPress plugin that allows attackers to gain unauthorized access to user accounts. Attackers can exploit this vulnerability to take over accounts without valid credentials. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Stacks Mobile App Builder WordPress Plugin
Versions: All versions up to and including 5.2.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Stacks Mobile App Builder plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise with administrative access, data theft, malware injection, and defacement of the WordPress site and associated mobile apps.

🟠

Likely Case

Unauthorized access to user accounts, potential privilege escalation, data exfiltration, and manipulation of mobile app content.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and regular security monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/stacks-mobile-app-builder/wordpress-stacks-mobile-app-builder-plugin-5-2-3-account-takeover-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Stacks Mobile App Builder'. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 5.2.4+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate stacks-mobile-app-builder

Restrict Access

all

Use web application firewall rules to block access to plugin endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable multi-factor authentication for all WordPress user accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Stacks Mobile App Builder version

Check Version:

wp plugin get stacks-mobile-app-builder --field=version

Verify Fix Applied:

Verify plugin version is 5.2.4 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts followed by successful login from same IP
  • Access to admin functions from unauthenticated users

Network Indicators:

  • HTTP requests to /wp-content/plugins/stacks-mobile-app-builder/ with unusual parameters
  • Traffic spikes to authentication endpoints

SIEM Query:

source="wordpress.log" AND ("stacks-mobile-app-builder" OR "authentication bypass")

🔗 References

📤 Share & Export