CVE-2024-8943

Authentication Bypass Using an Alternate Path or Channel (CWE-288)

Published: Oct 8, 2024 / Updated: 42d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

A vulnerability has been identified affecting WordPress and the LatePoint plugin. While the full details are not yet available, this vulnerability has been estimated to have a HIGH severity level. It impacts WordPress installations using the LatePoint plugin.

Impact

Given the HIGH severity estimate, this vulnerability could potentially allow attackers to compromise WordPress websites using the affected LatePoint plugin. The exact nature of the impact is not specified, but high-severity vulnerabilities in WordPress plugins often lead to unauthorized access, data breaches, or site takeovers. This could result in data theft, defacement of websites, or using the compromised sites for further malicious activities.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of October 8, 2024, there is no information available about a patch for this vulnerability. The CVE has been recently published, and patch information may be forthcoming. It is crucial to monitor official WordPress and LatePoint plugin channels for updates.

Mitigation

While specific mitigation steps are not provided, general best practices for WordPress security should be implemented: 1. Keep WordPress core, themes, and plugins updated to their latest versions. 2. Consider temporarily disabling the LatePoint plugin if it's not critical for your operations until a patch is available. 3. Implement strong access controls and use security plugins to enhance WordPress security. 4. Regularly backup your WordPress installation and database. 5. Monitor your website for any suspicious activities or unauthorized changes. 6. Follow the official WordPress and LatePoint channels for security advisories and update announcements.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-8943. See article

Oct 8, 2024 at 8:44 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 8, 2024 at 8:44 AM
CVE Assignment

NVD published the first details for CVE-2024-8943

Oct 8, 2024 at 9:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 8, 2024 at 9:21 AM / nvd
EPSS

EPSS Score was set to: 0.09% (Percentile: 39.7%)

Oct 9, 2024 at 10:30 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (152291)

Oct 10, 2024 at 7:53 AM
Static CVE Timeline Graph

Affected Systems

Latepoint/latepoint
+null more

Links to Mitre Att&cks

T1083: File and Directory Discovery
+null more

Attack Patterns

CAPEC-127: Directory Indexing
+null more

References

7,000 WordPress Sites Affected by Unauthenticated Critical Vulnerabilities in LatePoint WordPress Plugin
On September 17, 2024, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for two critical vulnerabilities in the LatePoint plugin, which is estimated to be actively installed on more than 7,000 WordPress websites. The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11.
7,000 WordPress Sites Affected by Unauthenticated Critical Vulnerabilities in LatePoint WordPress Plugin
On September 17, 2024, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for two critical vulnerabilities in the LatePoint plugin, which is estimated to be actively installed on more than 7,000 WordPress websites. The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11.

News

Web Application Detections Published in October 2024
In October, Qualys released QIDs targeting vulnerabilities in several widely used software products, including WordPress, Zohocorp ManageEngine Endpoint, Lobe Chat, Ivanti Virtual Traffic Manager (vTM), Traefik, Nginx Proxy Manager, Harbor, Haproxy, SolarWinds Access Rights Manager (ARM), Cacti, Ivanti Endpoint Manager Mobile (EPMM), JetBrains TeamCity, Palo Alto Networks Expedition, Progress Telerik Report Server, Zimbra, Oracle WebLogic Server, Apache Solr, FlatPress CMS, pgAdmin, Grafana, pfSense, SolarWinds Web Help Desk, Ivanti Avalanche, ReCrystallize Server, Joomla!, and PHP. The QIDs released to detect the vulnerabilities in the frameworks above are listed below. Details about the following QIDs can be found in our knowledge base. Please review reports of the scanned applications for these detections and, if any are identified follow the steps provided in the knowledge base to ensure applications are protected against the reported vulnerabilities. QID Title 152202 Zohocorp ManageEngine Endpoint Central Incorrect Authorization Vulnerability (CVE-2024-38868) 152206 WordPress Delicious Recipe Plugin: Arbitrary File Movement and Reading Vulnerability (CVE-2024-7626) 152207 WordPress Simple Spoiler Plugin: Arbitrary Shortcode Execution Vulnerability (CVE-2024-8479) 152209 WordPress PropertyHive Plugin: Cross-Site Request Forgery Vulnerability (CVE-2024-8490) 152210 WordPress Share This Image Plugin: Open Redirect Vulnerability (CVE-2024-8761) 152215 WordPress infolinks Ad Wrap Plugin: Cross-Site Request Forgery Vulnerability (CVE-2024-8044) 152216 WordPress Bit File Manager Plugin:
Vulnerability Notice – Adobe, Gitlab, Latepoint plugin (Wordpress), Oracle, Telerik Report Server
Gitlab has released a security update to address a critical-severity vulnerability (CVE-2024-9164) in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches. LatePoint plugin for WordPress has been updated to address two critical-severity vulnerabilities affecting versions up to and including 5.0.12.
Worldfence reports critical flaws in LatePoint WordPress plugin
CVE-2024-8911 (CVSS score 9.8) - Unauthenticated Arbitrary User Password Change - This vulnerability allows an unauthenticated attacker to change the password of any user, including administrator accounts, through a SQL injection exploit. CVE-2024-8943 (CVSS score 9.8) - Authentication Bypass - This flaw allows attackers to bypass authentication and access any user account, including those with administrative privileges, by exploiting weaknesses in the process_step_customer() function.
CVE-2024-8943
Critical Severity Description The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. This is due to insufficient verification on the user being supplied during the booking customer step. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. Note that logging in as a WordPress user is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. The vulnerability is partially patched in version 5.0.12 and fully patched in version 5.0.13. Read more at https://www.tenable.com/cve/CVE-2024-8943
LATEPOINT LATEPOINT PLUGIN CVE-2024-8943 CVE-2024-8943 LatePoint https://www. cve.org/CVERecord?id=CVE-2024- 8943 https://www. wordfence.com/threat-intel/vul nerabilities/id/bac8c35b-2afa-4347-b86e-2f16db19a4d3?source=cve https:// wpdocs.latepoint.com/changelog / # latepoint # LatePointPlugin # CVE_2024_8943 # bot
See 10 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI