CVE-2024-6698

8.8 HIGH

📋 TL;DR

The FundEngine WordPress plugin allows authenticated attackers with subscriber-level access or higher to escalate their privileges to administrator. This occurs because the plugin fails to properly validate user meta updates, enabling attackers to modify their own capabilities. All WordPress sites using FundEngine version 1.7.0 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress FundEngine plugin
Versions: All versions up to and including 1.7.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with FundEngine plugin enabled. Any authenticated user (subscriber or higher) can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the WordPress site, allowing them to install malicious plugins/themes, modify content, steal data, or establish persistent backdoors.

🟠

Likely Case

Attackers with existing low-privilege accounts (subscriber, contributor, author) elevate to administrator and perform unauthorized administrative actions.

🟢

If Mitigated

With proper access controls and monitoring, privilege escalation attempts are detected and blocked before administrative access is achieved.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has any valid user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3128099%40wp-fundraising-donation%2Ftrunk&old=3072093%40wp-fundraising-donation%2Ftrunk&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find FundEngine plugin and click 'Update Now'. 4. Verify version is 1.7.1 or higher.

🔧 Temporary Workarounds

Disable FundEngine plugin

all

Temporarily deactivate the vulnerable plugin until patching is possible

wp plugin deactivate wp-fundraising-donation

Restrict user registration

all

Disable new user registration to prevent attackers from creating accounts

Update WordPress Settings → General → Membership to uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Disable the FundEngine plugin immediately
  • Implement strict user access controls and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for FundEngine version 1.7.0 or earlier

Check Version:

wp plugin get wp-fundraising-donation --field=version

Verify Fix Applied:

Verify FundEngine plugin version is 1.7.1 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user meta updates, especially capability modifications
  • User role changes from subscriber/contributor to administrator
  • Multiple failed login attempts followed by successful privilege escalation

Network Indicators:

  • HTTP POST requests to user meta update endpoints from non-admin users
  • Unusual administrative actions from previously low-privilege accounts

SIEM Query:

source="wordpress" (event_type="user_meta_update" OR event_type="role_change") AND (user_role="subscriber" OR user_role="contributor" OR user_role="author")

🔗 References

📤 Share & Export