CVE-2024-9947

Improper Authentication (CWE-287)

Published: Oct 23, 2024 / Updated: 27d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

The ProfilePress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.11.1. This vulnerability is caused by insufficient verification of the user being returned by the social login token. As a result, unauthenticated attackers can potentially log in as any existing user on the site, including administrators, if they have access to the email and the user does not have an already-existing account for the service returning the token.

Impact

This vulnerability allows unauthenticated attackers to bypass authentication and gain unauthorized access to user accounts, including those with administrative privileges. The potential impacts include: 1. Unauthorized access to sensitive information stored in user accounts. 2. Ability to perform administrative actions on the WordPress site. 3. Potential for further exploitation of the system using elevated privileges. 4. Compromise of site integrity and confidentiality. 5. Possible reputational damage to the affected organization.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability affects all versions of the ProfilePress Pro plugin for WordPress up to and including version 4.11.1. Users should update to version 4.11.2 or later to mitigate this vulnerability.

Mitigation

1. Update the ProfilePress Pro plugin to version 4.11.2 or later immediately. 2. Conduct a thorough security audit to check for any signs of unauthorized access or changes made to the system. 3. Review and strengthen access controls for all user accounts, especially those with administrative privileges. 4. Implement multi-factor authentication for all user accounts, particularly for administrative access. 5. Monitor system logs for any suspicious activities related to authentication or user access. 6. Consider temporarily disabling social login features until the update can be applied if immediate patching is not possible. 7. Educate users about the importance of having unique accounts for each service to reduce the risk of token-based attacks.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9947

Oct 23, 2024 at 7:15 AM
First Article

Feedly found the first article mentioning CVE-2024-9947. See article

Oct 23, 2024 at 7:21 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 23, 2024 at 7:21 AM
EPSS

EPSS Score was set to: 0.09% (Percentile: 39.9%)

Oct 24, 2024 at 9:50 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 25, 2024 at 4:55 PM / nvd
Static CVE Timeline Graph

Affected Systems

Properfraction/profilepress
+null more

Links to Mitre Att&cks

T1548: Abuse Elevation Control Mechanism
+null more

Attack Patterns

CAPEC-114: Authentication Abuse
+null more

News

Update Thu Nov 7 14:29:30 UTC 2024
Update Thu Nov 7 14:29:30 UTC 2024
Wordfence Intelligence Weekly WordPress Vulnerability Report (October 21, 2024 to October 27, 2024)
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week: WordPress Plugins with Reported Vulnerabilities Last Week
CVE-2024-9947
High Severity Description The ProfilePress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.11.1. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token. Read more at https://www.tenable.com/cve/CVE-2024-9947
High - CVE-2024-9947 - The ProfilePress Pro plugin for WordPress is...
The ProfilePress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.11.1. This is due to insufficient verification on the user being returned by...
CVE-2024-9947
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI