CVE-2024-9658

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with student-level access or higher in the School Management System for WordPress plugin to change arbitrary users' email addresses and passwords, including administrators, leading to account takeover and privilege escalation. All WordPress sites using this plugin up to version 93.0.0 are affected.

💻 Affected Systems

Products:
  • School Management System for WordPress plugin
Versions: All versions up to and including 93.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least student-level authenticated access. WordPress multisite installations may be affected across all sites using the plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain administrative access, install backdoors, exfiltrate sensitive student data, and potentially use the site for further attacks.

🟠

Likely Case

Attackers gain administrative privileges, modify site content, access sensitive student/parent information, and potentially deploy malware.

🟢

If Mitigated

Limited impact with proper access controls, monitoring, and network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but only student-level privileges. The local file inclusion vulnerability may facilitate easier exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 93.0.0

Vendor Advisory: https://codecanyon.net/item/school-management-system-for-wordpress/11470032

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'School Management System for WordPress'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove the plugin immediately.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the School Management System plugin until patched

wp plugin deactivate school-management-system

Restrict user registration

all

Disable new user registrations to prevent attackers from obtaining student accounts

update wp_options set option_value = 'none' where option_name = 'users_can_register'

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance
  • Deploy web application firewall rules to block suspicious user update requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > School Management System for WordPress version. If version is 93.0.0 or lower, you are vulnerable.

Check Version:

wp plugin get school-management-system --field=version

Verify Fix Applied:

After updating, verify plugin version is higher than 93.0.0. Test user update functionality with student account to ensure proper authorization checks.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user profile update requests from student accounts
  • Multiple failed login attempts followed by successful login from new IP
  • Administrator account password reset requests from non-admin users

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=mj_smgt_update_user from student accounts
  • Unusual outbound connections after user privilege changes

SIEM Query:

source="wordpress.log" AND ("mj_smgt_update_user" OR "mj_smgt_add_admission") AND user_role="student"

🔗 References

📤 Share & Export