CVE-2024-9263

Authorization Bypass Through User-Controlled Key (CWE-639)

Published: Oct 17, 2024 / Updated: 34d ago

010
CVSS 9.8EPSS 0.05%Critical
CVE info copied to clipboard

Summary

The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin for WordPress is vulnerable to Account Takeover/Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 1.0.25. The vulnerability is due to missing validation on a user-controlled key in the save() function. This allows unauthenticated attackers to reset the emails and passwords of arbitrary user accounts, including administrators.

Impact

This vulnerability can lead to severe consequences: 1. Account Takeover: Attackers can reset emails and passwords of any user account, including administrators. 2. Privilege Escalation: By taking over an administrator account, attackers can gain full control of the WordPress site. 3. Data Breach: With administrative access, attackers can potentially access and exfiltrate sensitive information. 4. Website Compromise: Attackers could modify website content, install malicious plugins, or use the site for further attacks. 5. Reputational Damage: If exploited, it could lead to loss of trust from users and potential legal consequences.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is not explicitly mentioned in the provided information. However, given that the vulnerability affects "all versions up to, and including, 1.0.25" of the WP Timetics plugin, it is likely that a patched version (1.0.26 or later) may be available or in development. Users should check for updates and apply them as soon as they become available.

Mitigation

1. Update the WP Timetics plugin to a version newer than 1.0.25 if available. 2. If an update is not available, consider temporarily disabling the WP Timetics plugin until a patch is released. 3. Implement strong access controls and monitor for suspicious activities, especially those related to user account changes. 4. Use Web Application Firewalls (WAF) to help detect and block potential IDOR attacks. 5. Regularly audit user accounts and permissions, especially for administrative access. 6. Implement multi-factor authentication for all user accounts, especially administrative ones. 7. Keep WordPress core, themes, and all plugins up to date.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9263

Oct 17, 2024 at 4:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 17, 2024 at 4:20 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-9263. See article

Oct 17, 2024 at 4:21 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 17, 2024 at 4:21 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 16.4%)

Oct 17, 2024 at 10:04 AM
Threat Intelligence Report

CVE-2024-9263 is a critical vulnerability in the WP Timetics plugin for WordPress, with a CVSS score of 9.8, allowing unauthenticated attackers to perform account takeover and privilege escalation due to insecure direct object reference in the save() function. Currently, there is no evidence of exploitation in the wild or public proof-of-concept exploits, and while a patch is not explicitly mentioned, users are advised to update to a version newer than 1.0.25 or disable the plugin until a fix is available. Mitigations include implementing strong access controls, using Web Application Firewalls, and enabling multi-factor authentication for user accounts. See article

Oct 17, 2024 at 9:48 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (152322)

Oct 18, 2024 at 7:53 AM
Static CVE Timeline Graph

Affected Systems

Wordpress/wordpress
+null more

News

DaresNone/CVE-2024-9263
[GitHub]Authorization Bypass Through User-Controlled Key
youngwhale21/CVE-2024-9263
[GitHub]Authorization Bypass Through User-Controlled Key - CVE-2024-9263
Web Application Detections Published in October 2024
In October, Qualys released QIDs targeting vulnerabilities in several widely used software products, including WordPress, Zohocorp ManageEngine Endpoint, Lobe Chat, Ivanti Virtual Traffic Manager (vTM), Traefik, Nginx Proxy Manager, Harbor, Haproxy, SolarWinds Access Rights Manager (ARM), Cacti, Ivanti Endpoint Manager Mobile (EPMM), JetBrains TeamCity, Palo Alto Networks Expedition, Progress Telerik Report Server, Zimbra, Oracle WebLogic Server, Apache Solr, FlatPress CMS, pgAdmin, Grafana, pfSense, SolarWinds Web Help Desk, Ivanti Avalanche, ReCrystallize Server, Joomla!, and PHP. The QIDs released to detect the vulnerabilities in the frameworks above are listed below. Details about the following QIDs can be found in our knowledge base. Please review reports of the scanned applications for these detections and, if any are identified follow the steps provided in the knowledge base to ensure applications are protected against the reported vulnerabilities. QID Title 152202 Zohocorp ManageEngine Endpoint Central Incorrect Authorization Vulnerability (CVE-2024-38868) 152206 WordPress Delicious Recipe Plugin: Arbitrary File Movement and Reading Vulnerability (CVE-2024-7626) 152207 WordPress Simple Spoiler Plugin: Arbitrary Shortcode Execution Vulnerability (CVE-2024-8479) 152209 WordPress PropertyHive Plugin: Cross-Site Request Forgery Vulnerability (CVE-2024-8490) 152210 WordPress Share This Image Plugin: Open Redirect Vulnerability (CVE-2024-8761) 152215 WordPress infolinks Ad Wrap Plugin: Cross-Site Request Forgery Vulnerability (CVE-2024-8044) 152216 WordPress Bit File Manager Plugin:
Wordfence Intelligence Weekly WordPress Vulnerability Report (October 14, 2024 to October 20, 2024)
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week: WordPress Plugins with Reported Vulnerabilities Last Week
Vulnerability Summary for the Week of October 14, 2024
High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source Info Patch Info Acespritech Solutions Pvt. Ltd.–Social Link Groups Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Acespritech Solutions Pvt. Ltd. Social Link Groups allows Blind SQL Injection.This issue affects Social Link Groups: from n/a through 1.1.0. 2024-10-20 8.5 CVE-2024-49619 audit@patchstack.com acm309–PutongOJ PutongOJ is online judging software. Prior to version 2.1.0-beta.1, unprivileged users can escalate privileges by constructing requests. This can lead to unauthorized access, enabling users to perform admin-level operations, potentially compromising sensitive data and system integrity. This problem has been fixed in v2.1.0.beta.1. As a workaround, one may apply the patch from commit `211dfe9` manually.
See 13 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI