CVE-2024-8102

8.8 HIGH

📋 TL;DR

This vulnerability in the WP Extended WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modify arbitrary WordPress site options due to missing capability checks. Attackers can change the default user registration role to administrator and enable user registration, gaining full administrative control. All WordPress sites using WP Extended plugin versions up to 3.0.8 are affected.

💻 Affected Systems

Products:
  • The Ultimate WordPress Toolkit – WP Extended
Versions: All versions up to and including 3.0.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WP Extended plugin enabled and at least one authenticated user account (Subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers create administrator accounts for themselves, gaining full control over the WordPress installation and potentially the underlying server.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized option changes are detected and prevented before privilege escalation occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has any WordPress user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.9

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3145430%40wpextended%2Ftrunk&old=3134345%40wpextended%2Ftrunk&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'The Ultimate WordPress Toolkit – WP Extended'. 4. Click 'Update Now' if available, or download version 3.0.9+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable WP Extended Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wpextended

Restrict User Registration

all

Disable user registration in WordPress settings to prevent account creation

🧯 If You Can't Patch

  • Remove or disable the WP Extended plugin entirely
  • Implement strict access controls and monitor for unauthorized option changes in wp_options table

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Extended version. If version is 3.0.8 or lower, you are vulnerable.

Check Version:

wp plugin get wpextended --field=version

Verify Fix Applied:

Verify WP Extended plugin version is 3.0.9 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized modifications to wp_options table
  • Unexpected user role changes from subscriber to administrator
  • New administrator account creation

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=module_all_toggle
  • Unusual option update requests from non-admin users

SIEM Query:

source="wordpress" AND (event="option_update" AND user_role="subscriber" OR user_role="contributor" OR user_role="author")

🔗 References

📤 Share & Export