CVE-2024-9624

7.6 HIGH

📋 TL;DR

The WP All Import Pro WordPress plugin has a Server-Side Request Forgery vulnerability that allows authenticated attackers with Administrator privileges to make arbitrary web requests from the vulnerable server. This can be used to query internal services, access cloud metadata, or potentially interact with internal systems. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • WP All Import Pro WordPress Plugin
Versions: All versions up to and including 4.9.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated Administrator access to exploit. Cloud-hosted WordPress sites are particularly at risk for metadata exposure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal services, retrieve cloud instance metadata (including credentials), perform internal network reconnaissance, or interact with internal APIs that shouldn't be externally accessible.

🟠

Likely Case

Attackers with compromised admin credentials could exfiltrate cloud metadata, scan internal networks, or interact with internal services like databases or management interfaces.

🟢

If Mitigated

With proper network segmentation and cloud metadata protection, impact would be limited to internal service enumeration without credential access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Administrator credentials but is straightforward once authenticated. The vulnerability is in a core plugin function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.4

Vendor Advisory: https://www.wpallimport.com

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP All Import Pro. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.9.4+ from wpallimport.com and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable WP All Import Pro plugin until patched

wp plugin deactivate wp-all-import-pro

Restrict Admin Access

linux

Implement IP whitelisting for WordPress admin panel

# Add to .htaccess for Apache:
<Files wp-login.php>
Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
</Files>
# Add to nginx config:
location /wp-admin {
allow 192.168.1.0/24;
deny all;
}

🧯 If You Can't Patch

  • Implement network segmentation to restrict outbound connections from web servers
  • Configure cloud metadata service to require authentication or disable it if not needed

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP All Import Pro version

Check Version:

wp plugin get wp-all-import-pro --field=version

Verify Fix Applied:

Verify WP All Import Pro version is 4.9.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs or metadata endpoints
  • Multiple failed authentication attempts followed by successful admin login

Network Indicators:

  • Web server making requests to 169.254.169.254 (AWS/Azure/GCP metadata)
  • Web server scanning internal network ranges

SIEM Query:

source="web_server_logs" AND (dest_ip=169.254.169.254 OR dest_ip IN 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16) AND user_agent="WordPress"

🔗 References

📤 Share & Export