CVE-2024-9235

Improper Authorization (CWE-285)

Published: Oct 25, 2024 / Updated: 25d ago

010
CVSS 8.8EPSS 0.07%High
CVE info copied to clipboard

Summary

The Mapster WP Maps plugin for WordPress has an insufficient capability check in the mapster_wp_maps_set_option_from_js() function in all versions up to and including 1.5.0. This vulnerability allows unauthorized modification of data that can lead to privilege escalation. Authenticated attackers with contributor-level access or higher can update arbitrary options on the WordPress site.

Impact

This vulnerability has a high severity with a CVSS v3.1 base score of 8.8. Attackers can leverage this flaw to update the default role for new user registration to administrator and enable user registration. This allows attackers to create new accounts with administrative privileges, effectively gaining full control over the vulnerable WordPress site. The impact on confidentiality, integrity, and availability is high, as administrative access can lead to unauthorized data access, modification of site content and settings, and potential disruption of site operations.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability affects all versions of the Mapster WP Maps plugin up to and including version 1.5.0. A patch has been added on 2024-11-05, as indicated by the patchDetails in the vulnerability data.

Mitigation

1. Immediately update the Mapster WP Maps plugin to a version newer than 1.5.0. 2. If an update is not possible, consider temporarily disabling the Mapster WP Maps plugin until it can be updated. 3. Implement the principle of least privilege by reviewing and restricting user roles and permissions, especially for contributor-level accounts and above. 4. Monitor the WordPress site for any suspicious activities, particularly changes in user roles or unexpected new administrator accounts. 5. Disable user registration if it's not necessary for the site's operation. 6. Regularly audit WordPress options and settings for any unauthorized changes. 7. Implement additional security measures such as Web Application Firewalls (WAF) to help detect and prevent exploitation attempts.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9235. See article

Oct 24, 2024 at 11:36 PM / Feedly
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 24, 2024 at 11:37 PM
CVE Assignment

NVD published the first details for CVE-2024-9235

Oct 25, 2024 at 7:15 AM
CVSS

A CVSS base score of 8.8 has been assigned.

Oct 25, 2024 at 7:20 AM / nvd
EPSS

EPSS Score was set to: 0.07% (Percentile: 30.2%)

Oct 26, 2024 at 9:53 AM
Static CVE Timeline Graph

Affected Systems

Mapster/mapster_wp_maps
+null more

Patches

plugins.trac.wordpress.org
+null more

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
+null more

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI