CVE-2024-7493

9.8 CRITICAL

📋 TL;DR

The WPCOM Member WordPress plugin allows unauthenticated attackers to register as administrators due to improper input validation. This affects all WordPress sites using WPCOM Member plugin versions 1.5.2.1 and earlier. Attackers can gain full administrative control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • WPCOM Member WordPress Plugin
Versions: All versions up to and including 1.5.2.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress sites with the WPCOM Member plugin installed and user registration enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrative privileges, allowing data theft, defacement, malware injection, and further network compromise.

🟠

Likely Case

Attackers create administrator accounts to install backdoors, steal sensitive data, or use the site for malicious activities.

🟢

If Mitigated

Attack prevented through patching or workarounds, with no privilege escalation possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request manipulation during user registration can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.2.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.5.2.2/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WPCOM Member plugin. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.5.2.2+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable new user registration in WordPress settings

Deactivate WPCOM Member Plugin

all

Completely disable the vulnerable plugin until patched

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious user registration requests
  • Monitor user creation logs for administrator role assignments

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WPCOM Member version 1.5.2.1 or earlier

Check Version:

wp plugin list --name=wpcom-member --field=version

Verify Fix Applied:

Confirm WPCOM Member plugin version is 1.5.2.2 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • User registration logs showing role parameter manipulation
  • New administrator accounts created via registration form

Network Indicators:

  • HTTP POST requests to registration endpoints with role parameter set to administrator

SIEM Query:

source="wordpress.log" AND "wp_insert_user" AND "role=administrator"

🔗 References

📤 Share & Export