CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-8277

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.15872/1

CVE-2024-8277: Authentication bypass vulnerability in WooCommerce Photo Reviews Premium plugin for WordPress. This allows unauthenticated attackers to potentially log in as administrators. The plugin, versions up to 1.3.13.2, fails to properly validate user transients and verify user identity in the login() function. Attackers can exploit this to gain unauthorized access. Despite a relatively low SVRS of 30, the "Exploit Available" tag and presence "In The Wild" indicates heightened risk. Although CVSS score is 0, the active exploits and potential for admin access necessitate vigilance. Immediate patching is recommended to mitigate the threat of unauthorized account takeover.

In The Wild
Exploit Avaliable
2024-09-11

2024-09-26
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-8277 is a critical vulnerability in the WooCommerce Photo Reviews Premium plugin for WordPress, affecting all versions up to 1.3.13.2. It allows unauthenticated attackers to bypass authentication and log in as any user with a valid user_id transient. This vulnerability has a CVSS score of 9.8 and an SVRS of 46, indicating a high level of urgency and severity.

Key Insights

  • Authentication Bypass: The vulnerability allows attackers to bypass authentication and gain unauthorized access to WordPress websites.
  • Exploitation in the Wild: Active exploits have been published, indicating that the vulnerability is being actively exploited by hackers.
  • High Impact: The vulnerability can lead to complete website takeover, data theft, and other malicious activities.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.

Mitigation Strategies

  • Update the Plugin: Update the WooCommerce Photo Reviews Premium plugin to version 1.3.14 or later to patch the vulnerability.
  • Disable the Plugin: If updating is not immediately possible, disable the plugin to prevent exploitation.
  • Implement Strong Authentication: Use two-factor authentication or other strong authentication measures to make it more difficult for attackers to exploit the vulnerability.
  • Monitor for Suspicious Activity: Monitor website logs and security alerts for any suspicious activity that may indicate exploitation.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have been published.
  • CISA Warnings: CISA has issued a warning about the vulnerability.
  • In the Wild: The vulnerability is actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
PolatBey/CVE-2024-8277https://github.com/PolatBey/CVE-2024-82772024-09-12
realbotnet/CVE-2024-8277https://github.com/realbotnet/CVE-2024-82772024-09-11
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
SECURITY@WORDFENCE.COMhttps://codecanyon.net/item/woocommerce-photo-reviews/21245349
SECURITY@WORDFENCE.COMhttps://www.wordfence.com/threat-intel/vulnerabilities/id/a1e2d370-a716-4d6b-8e23-74db2fbd0760?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-288Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306Missing Authentication for Critical FunctionThe software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence