CVE-2024-8292

9.8 CRITICAL

📋 TL;DR

The WP-Recall plugin for WordPress has a critical vulnerability that allows unauthenticated attackers to reset any user's password by supplying their email address during new order creation. This leads to complete account takeover and privilege escalation. All WordPress sites using WP-Recall with the commerce addon enabled are affected.

💻 Affected Systems

Products:
  • WP-Recall WordPress plugin
Versions: All versions up to and including 16.26.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ✅ No
Notes: Requires the commerce addon to be enabled for exploitation. The vulnerability exists in the order creation functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers can take over administrator accounts, gain full control of the WordPress site, install backdoors, steal sensitive data, and potentially compromise the entire server infrastructure.

🟠

Likely Case

Attackers will compromise user accounts to steal personal information, payment details, and use compromised accounts for spam, phishing, or further attacks within the WordPress ecosystem.

🟢

If Mitigated

With proper monitoring and immediate response, impact is limited to temporary service disruption and mandatory password resets for affected users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - attackers only need to send a crafted request to the order creation endpoint with a target email address. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.26.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3145798/wp-recall/trunk/add-on/commerce/classes/class-rcl-create-order.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find WP-Recall plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 16.26.9+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Commerce Addon

all

Temporarily disable the commerce functionality to prevent exploitation while planning permanent fix

Navigate to WP-Recall settings and disable commerce module

Disable Plugin Entirely

all

Completely disable WP-Recall plugin until patched version is available

In WordPress admin: Plugins → Installed Plugins → Deactivate WP-Recall

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to order creation endpoints from unauthenticated users
  • Enable detailed logging of all password reset and order creation activities and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check WP-Recall plugin version in WordPress admin panel under Plugins → Installed Plugins. If version is 16.26.8 or lower and commerce addon is enabled, the site is vulnerable.

Check Version:

WordPress admin panel: Plugins → Installed Plugins → look for WP-Recall version

Verify Fix Applied:

After updating, verify plugin version shows 16.26.9 or higher. Test order creation functionality to ensure proper user authentication is enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from new IP
  • Unusual order creation requests with email parameter manipulation
  • Password reset requests for multiple users from same IP

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=rcl_create_order containing user_email parameter
  • Requests to order creation endpoints from unauthenticated sources

SIEM Query:

source="wordpress.log" AND ("rcl_create_order" OR "user_email") AND status=200 AND user="-"

🔗 References

📤 Share & Export