CVE-2024-8290

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with subscriber or customer permissions to modify administrator email addresses via an insecure direct object reference flaw. Attackers can then trigger password resets to gain administrative access. All WordPress sites using vulnerable versions of the WCFM plugin are affected.

💻 Affected Systems

Products:
  • WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible
Versions: All versions up to and including 6.7.12
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WCFM plugin installed and at least one user with subscriber or customer role.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrator privileges, install backdoors, steal sensitive data, and deface or destroy the website.

🟠

Likely Case

Attackers gain administrative access to compromise the WordPress site, potentially leading to data theft, malware injection, or unauthorized content changes.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to detection of unauthorized email modification attempts and prevention of successful privilege escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has subscriber-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.13 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3156433/wc-frontend-manager/trunk/controllers/customers/wcfm-controller-customers-manage.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WCFM plugin and update to version 6.7.13 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Temporarily disable WCFM plugin

all

Disable the vulnerable plugin until patching is possible

wp plugin deactivate wc-frontend-manager

Restrict user registration

all

Temporarily disable new user registration to prevent attacker account creation

🧯 If You Can't Patch

  • Implement strict monitoring for user email modification events in WordPress logs
  • Apply network-level restrictions to limit access to WordPress admin areas

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WCFM version 6.7.12 or earlier

Check Version:

wp plugin get wc-frontend-manager --field=version

Verify Fix Applied:

Confirm WCFM plugin version is 6.7.13 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user email modification events
  • Multiple failed password reset attempts for admin accounts
  • User role escalation from subscriber/customer to administrator

Network Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with customer management parameters
  • Traffic patterns showing privilege escalation attempts

SIEM Query:

source="wordpress.log" AND ("update_user" OR "user_email" OR "password_reset") AND user_role="administrator"

🔗 References

📤 Share & Export