CVE-2024-5324
📋 TL;DR
This vulnerability in the Login/Signup Popup plugin for WordPress allows authenticated users with Subscriber-level access or higher to modify arbitrary site options. Attackers can enable new user registration and set the default role to Administrator, potentially gaining full control. WordPress sites using vulnerable plugin versions 2.7.1 to 2.7.2 are affected.
💻 Affected Systems
- Login/Signup Popup (Inline Form + Woocommerce) WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative privileges, leading to complete site compromise, data theft, malware injection, or site defacement.
Likely Case
Attackers create administrative accounts for themselves, enabling persistent access and further malicious activities.
If Mitigated
With proper access controls and monitoring, impact is limited to unauthorized option changes that can be detected and reverted.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward due to missing capability checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.7.3
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3093994/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Login/Signup Popup (Inline Form + Woocommerce)'. 4. Click 'Update Now' if available, or manually update to version 2.7.3 or later.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched.
wp plugin deactivate easy-login-woocommerce
Restrict user registration
allDisable new user registration in WordPress settings.
🧯 If You Can't Patch
- Remove Subscriber and higher role access from untrusted users.
- Implement web application firewall rules to block suspicious option modification requests.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Login/Signup Popup (Inline Form + Woocommerce)' version 2.7.1 or 2.7.2.
Check Version:
wp plugin get easy-login-woocommerce --field=version
Verify Fix Applied:
Confirm plugin version is 2.7.3 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual option changes in WordPress logs, especially to 'users_can_register' or 'default_role'.
- Administrator account creation from non-admin users.
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with action 'import_settings' from low-privilege users.
SIEM Query:
source="wordpress.log" AND ("users_can_register" OR "default_role" OR "import_settings")
🔗 References
- https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/trunk/includes/xoo-framework/admin/class-xoo-admin-settings.php#L83
- https://plugins.trac.wordpress.org/changeset/3093994/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/005a27c6-b9eb-466c-b0c3-ce52c25bb321?source=cve
- https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/trunk/includes/xoo-framework/admin/class-xoo-admin-settings.php#L83
- https://plugins.trac.wordpress.org/changeset/3093994/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/005a27c6-b9eb-466c-b0c3-ce52c25bb321?source=cve