CVE-2024-6695

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to gain administrative access to affected systems by exploiting a logic flaw in the user registration process. Attackers can perform any administrative action without having any account on the target site. This affects systems running vulnerable versions of the software with user registration enabled.

💻 Affected Systems

Products:
  • WordPress
Versions: Specific version range not specified in provided reference, but appears to affect recent versions
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user registration functionality to be enabled. The vulnerability is in the registration logic flow.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain full administrative control, can modify content, steal data, install backdoors, or take down the entire system.

🟠

Likely Case

Attackers gain administrative access to create backdoor accounts, modify system settings, access sensitive data, or deface the website.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the registration process logic, making exploitation straightforward for attackers who understand the flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WordPress core updates or plugin updates if applicable

Vendor Advisory: https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/

Restart Required: No

Instructions:

1. Update WordPress to the latest version. 2. Update all plugins and themes. 3. Check for security patches from the specific plugin/theme vendor if this is a plugin/theme vulnerability.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable user registration functionality to prevent exploitation

In WordPress admin: Settings > General > uncheck 'Anyone can register'

Implement Web Application Firewall Rules

all

Block suspicious registration attempts

Configure WAF to block requests with suspicious registration parameters

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Enable detailed logging and monitoring of all registration attempts

🔍 How to Verify

Check if Vulnerable:

Check if user registration is enabled and test registration flow for logic flaws

Check Version:

In WordPress: Dashboard > Updates or check wp-includes/version.php

Verify Fix Applied:

Test registration process to ensure proper authentication checks are in place

📡 Detection & Monitoring

Log Indicators:

  • Unusual registration attempts, multiple admin account creations, registration from suspicious IPs

Network Indicators:

  • HTTP POST requests to registration endpoints with modified parameters

SIEM Query:

source="web_logs" AND (uri_path="/wp-login.php?action=register" OR uri_path CONTAINS "register") AND status_code=200

🔗 References

📤 Share & Export