Security Bulletin

CVE-2024-1071 – Critical Vulnerability in Ultimate Member WordPress Plugin

A critical security flaw, known as CVE-2024-1071, has been found in the Ultimate Member plugin for WordPress. This vulnerability, with a CVSS score of 9.8, poses a significant risk to over 200,000 active installations.

It potentially enables attackers to extract sensitive data from compromised databases, presenting a severe threat to website security.

Understanding the Vulnerability – CVE-2024-1071

The vulnerability affects versions 2.1.3 to 2.8.2 of the Ultimate Member plugin and revolves around an unauthenticated SQL Injection flaw associated with the ‘sorting’ parameter.

Attackers can exploit this weakness to inject malicious SQL queries, exploiting insufficient escaping mechanisms and inadequate query preparation.

Notably, users who have enabled the “Enable custom table for usermeta” option within the plugin settings are particularly vulnerable.

Active Exploitation and Threat Landscape

The severity of CVE-2024-1071 is underscored by its high-severity CVSS score of 9.8.

Notably, attackers, including the pro-Palestinian group “Handala,” are leveraging sophisticated techniques such as Time-Based blind SQL Injection to exploit this vulnerability actively.

Prevention and Mitigation

In response to the disclosure, the plugin developers promptly addressed the issue by releasing version 2.8.3 on February 19. Users are strongly urged to update their Ultimate Member plugin to the latest version promptly to mitigate potential threats.

This recommendation is crucial, given the demonstrated effectiveness of attackers in exploiting vulnerabilities within a short timeframe.

Check out the best practices to prevent SQL Injection attacks from our detailed guide.

Prior Security Incidents and Lessons Learned

This isn’t the first security incident involving the Ultimate Member plugin. In July 2023, cybercriminals exploited another weakness, identified as CVE-2023-3460, to establish unauthorized admin users and gain control of vulnerable websites. The recurrence of security challenges emphasizes the importance of robust security practices and timely software updates.

AppTrana WAAP Threat Coverage

AppTrana’s WAAP customers are shielded from this critical SQL injection vulnerability right from Day 0.

In addition to patches from the vendor, AppTrana provides additional protection patterns for an added layer of defense against potential exploits.

Our dedicated Indusface managed security team has curated rules to promptly detect WordPress plugin vulnerability and thwart attempts at exploitation.

The screenshot demonstrates AppTrana WAAP’s ability to block the exploitation of this vulnerability.

WAAP instantly responds to malicious requests intercepted through Burp by delivering a robust 406-status code.

Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

Deepak Kumar Choudhary

Deepak Choudhary is an adept Security Researcher at Indusface. He specializes in developing detection logic and signatures to identify various security vulnerabilities, including 0-day vulnerabilities, making him a frontline defender of digital environments.Driven by his passion for cyber defense, He continuously seeks to expand his knowledge of security concepts. He eagerly tackles the task of resolving vulnerable systems on platforms such as TryHackMe and HackTheBox, sharpening his skills in real-world scenarios. Through his expertise and dedication, he is committed to fortifying digital landscapes, ensuring a safer online experience for users and organizations alike.

This post was last modified on March 11, 2024 18:47

Share
Deepak Kumar Choudhary
Published by
Deepak Kumar Choudhary

Recent Posts

Managed WAF: A Must-Have to Stop Website Attacks

A Managed WAF is a comprehensive cybersecurity service offered by specialized providers to oversee, optimize,… Read More

3 days ago

Top 10 Best Practices for Attack Surface Reduction

Explore crucial tactics like Asset Inventory, Patch Management, Access Control & Authentication, and additional best… Read More

2 weeks ago

10 Important Data Privacy Questions You Should be Asking Now

Delve into the data privacy questions including consent protocols, data minimization strategies, user rights management,… Read More

2 weeks ago