CVE-2024-9862

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to change any WordPress user's password, including administrators, without knowing the current password. It affects WordPress sites using the Miniorange OTP Verification with Firebase plugin. Attackers can take over accounts and gain administrative access to vulnerable sites.

💻 Affected Systems

Products:
  • Miniorange OTP Verification with Firebase WordPress plugin
Versions: All versions up to and including 3.6.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover via administrator account compromise leading to data theft, defacement, malware injection, or ransomware deployment.

🟠

Likely Case

Unauthenticated attackers change administrator passwords to gain full control of WordPress sites for malicious purposes.

🟢

If Mitigated

Limited impact if plugin is disabled or removed before exploitation, though sites remain vulnerable until patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted requests to vulnerable endpoints; proof-of-concept code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.1

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3169869/miniorange-firebase-sms-otp-verification

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Miniorange OTP Verification with Firebase'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 3.6.1+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched to prevent exploitation.

wp plugin deactivate miniorange-firebase-sms-otp-verification

Web application firewall rule

linux

Block requests to vulnerable plugin endpoints.

# Add rule to block access to /wp-content/plugins/miniorange-firebase-sms-otp-verification/handler/forms/

🧯 If You Can't Patch

  • Immediately disable or remove the Miniorange OTP Verification with Firebase plugin from all WordPress installations.
  • Implement strict network access controls to limit access to WordPress admin interfaces and monitor for unauthorized password change attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Miniorange OTP Verification with Firebase' version 3.6.0 or lower.

Check Version:

wp plugin get miniorange-firebase-sms-otp-verification --field=version

Verify Fix Applied:

Confirm plugin version is 3.6.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-content/plugins/miniorange-firebase-sms-otp-verification/handler/forms/class-loginform.php
  • Multiple failed login attempts followed by successful password reset for privileged accounts

Network Indicators:

  • HTTP requests to vulnerable plugin endpoints from unexpected IP addresses
  • Unusual traffic patterns to WordPress password reset functionality

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/miniorange-firebase-sms-otp-verification/handler/forms/class-loginform.php" OR message="password reset" OR message="password changed")

🔗 References

📤 Share & Export