CVE-2024-9522

8.8 HIGH

📋 TL;DR

The WP Users Masquerade WordPress plugin has an authentication bypass vulnerability that allows authenticated attackers with subscriber-level permissions or higher to log in as any user, including administrators. This affects WordPress sites using the plugin version 2.0.0 or earlier. Attackers can gain elevated privileges and potentially take full control of affected websites.

💻 Affected Systems

Products:
  • WP Users Masquerade WordPress Plugin
Versions: Up to and including 2.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Attackers need at least subscriber-level authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain administrative access, install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers gain administrative privileges, modify content, install malicious plugins/themes, or exfiltrate user data.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and least privilege principles are implemented, though authentication bypass remains a critical issue.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has subscriber-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.1

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-users-masquerade/trunk/masquerade.php?rev=1703860#L162

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Users Masquerade' and update to version 2.0.1 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable the vulnerable plugin

all

Temporarily disable the WP Users Masquerade plugin until patching is possible

wp plugin deactivate wp-users-masquerade

Restrict user registration

all

Disable new user registration to prevent attackers from obtaining subscriber accounts

Update WordPress settings: Settings → General → Membership → Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Immediately disable the WP Users Masquerade plugin via WordPress admin or command line
  • Implement web application firewall (WAF) rules to block requests to the vulnerable ajax_masq_login function

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WP Users Masquerade version 2.0.0 or earlier

Check Version:

wp plugin get wp-users-masquerade --field=version

Verify Fix Applied:

Verify plugin version shows 2.0.1 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user privilege escalation in WordPress logs
  • Multiple login events from same IP with different user accounts
  • Access to admin functions from previously non-admin users

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=masq_login parameter
  • Unusual spikes in admin area traffic from non-admin users

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data="action=masq_login")

🔗 References

📤 Share & Export