CVE-2024-7624

8.1 HIGH

📋 TL;DR

The Zephyr Project Manager WordPress plugin has a privilege escalation vulnerability that allows authenticated users with subscriber-level access or higher to grant themselves full administrative access to the plugin's settings. This affects all WordPress sites using the plugin up to version 3.3.101. Attackers can exploit this to gain unauthorized control over project management features.

💻 Affected Systems

Products:
  • Zephyr Project Manager WordPress Plugin
Versions: All versions up to and including 3.3.101
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one authenticated user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the Zephyr Project Manager plugin, allowing them to manipulate projects, tasks, user permissions, and potentially use the plugin as a foothold for further attacks on the WordPress installation.

🟠

Likely Case

Malicious users or compromised accounts escalate privileges to modify project data, steal sensitive project information, or disrupt project management operations.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to unauthorized plugin configuration changes that can be detected and rolled back.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has any WordPress user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.102 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3134404/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Zephyr Project Manager and click 'Update Now'. 4. Alternatively, download version 3.3.102+ from WordPress plugin repository and manually replace the plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Zephyr Project Manager plugin until patched

wp plugin deactivate zephyr-project-manager

Restrict User Registration

all

Disable new user registration to prevent attackers from creating accounts

Update WordPress Settings → General → Membership to uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement strict user access controls and monitor for unusual privilege changes
  • Disable the plugin's AJAX endpoints or restrict access to authenticated administrators only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Zephyr Project Manager version. If version is 3.3.101 or lower, you are vulnerable.

Check Version:

wp plugin get zephyr-project-manager --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 3.3.102 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to update_user_access function
  • User privilege escalation events in WordPress logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=zpm_update_user_access
  • Unusual traffic patterns from subscriber-level accounts

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data LIKE "%zpm_update_user_access%")

🔗 References

📤 Share & Export