CVE-2024-6690

6.1 MEDIUM

📋 TL;DR

The wccp-pro WordPress plugin before version 15.3 contains an open redirect vulnerability via the referrer parameter. This allows attackers to redirect users to malicious external sites, potentially leading to phishing attacks or malware distribution. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • wccp-pro WordPress plugin
Versions: All versions before 15.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with the wccp-pro plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to phishing sites that steal credentials or install malware, leading to account compromise, data theft, or ransomware infection.

🟠

Likely Case

Attackers use the redirect for phishing campaigns, tricking users into entering credentials on fake login pages.

🟢

If Mitigated

Users notice the redirect and avoid interacting with malicious sites, limiting impact to potential reputation damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious URL with the referrer parameter pointing to an external site.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.3

Vendor Advisory: https://wpscan.com/vulnerability/09c6848d-30dc-4382-ae74-b470f586e142/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find wccp-pro plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 15.3+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable wccp-pro plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate wccp-pro

Web Application Firewall rule

all

Block requests containing malicious referrer parameters.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirects
  • Monitor web server logs for suspicious referrer parameter patterns

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If wccp-pro version is below 15.3, it's vulnerable.

Check Version:

wp plugin list --name=wccp-pro --field=version

Verify Fix Applied:

Confirm wccp-pro plugin version is 15.3 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with referrer parameter containing external domains
  • Multiple redirect responses (302/301) to unfamiliar domains

Network Indicators:

  • Unusual outbound redirects from WordPress site
  • Traffic to known malicious domains following site visits

SIEM Query:

SELECT * FROM web_logs WHERE url LIKE '%referrer=%' AND (url LIKE '%http://%' OR url LIKE '%https://%') AND NOT url LIKE '%yourdomain.com%'

🔗 References

📤 Share & Export