CVE-2024-9593

8.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers running vulnerable versions of Time Clock or Time Clock Pro plugins. Attackers can remotely compromise the web server without requiring any authentication. All WordPress sites using these plugins in affected versions are at risk.

💻 Affected Systems

Products:
  • Time Clock for WordPress
  • Time Clock Pro for WordPress
Versions: Time Clock up to and including 1.2.2, Time Clock Pro up to and including 1.1.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with these plugins enabled are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Website defacement, malware injection, credential theft, and unauthorized access to sensitive data stored on the server.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and intrusion detection systems in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in an AJAX callback function that doesn't properly validate user input, allowing direct code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Time Clock 1.2.3+, Time Clock Pro 1.1.5+

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3171046/time-clock#file40

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Time Clock or Time Clock Pro. 4. Click 'Update Now' if available. 5. If not available, delete the plugin and install the latest version from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable plugins

all

Temporarily disable the Time Clock or Time Clock Pro plugins until patched.

wp plugin deactivate time-clock
wp plugin deactivate time-clock-pro

Web Application Firewall rule

all

Block requests to the vulnerable AJAX endpoint.

Block HTTP requests containing 'etimeclockwp_load_function_callback' in URL or parameters

🧯 If You Can't Patch

  • Remove the plugins completely from the WordPress installation
  • Implement strict network segmentation and isolate the vulnerable server

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Time Clock or Time Clock Pro version numbers.

Check Version:

wp plugin list --name=time-clock --field=version

Verify Fix Applied:

Verify plugin version is Time Clock 1.2.3+ or Time Clock Pro 1.1.5+ in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with 'action=etimeclockwp_load_function_callback' parameter
  • Unusual PHP process execution from web server user
  • Web server error logs showing code execution attempts

Network Indicators:

  • POST requests to admin-ajax.php with suspicious payloads
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_server_logs" AND (uri="/wp-admin/admin-ajax.php" AND params CONTAINS "etimeclockwp_load_function_callback")

🔗 References

📤 Share & Export