Woffice Privilege Escalation Vulnerability Affects All Versions From n/a to 5.4.10
CVE-2024-43153

9.8CRITICAL

Key Information:

Vendor
WordPress
Status
Vendor
CVE Published:
13 August 2024

What is CVE-2024-43153?

CVE-2024-43153 is a privilege escalation vulnerability found in the Woffice WordPress theme developed by Wofficeio. This theme is widely used for building and managing websites, and it enhances user control over various site functionalities. The vulnerability arises from improper privilege management, which could allow an attacker to escalate their privileges and gain unauthorized access to restricted areas of the site. Organizations using affected versions risk potential breaches that can compromise sensitive data and undermine their website security.

Technical Details

CVE-2024-43153 affects all versions of Woffice leading up to and including version 5.4.10. The core issue relates to inadequate control over user privileges, resulting in the possibility for malicious users to exploit the vulnerability and perform actions that should normally be restricted. This could include accessing administrative features or user data, which are critical for maintaining the integrity and security of WordPress sites.

Potential impact of CVE-2024-43153

  1. Unauthorized Access: Exploitation of this vulnerability may allow attackers to gain access to administrative panels and sensitive data, enabling them to manipulate content or configurations within the website.

  2. Data Breach Risks: With escalated privileges, attackers could access confidential information or customer data, putting organizations at risk of data breaches and increasing the potential for regulatory fines.

  3. Increased Attack Surface: The existence of this vulnerability can attract malicious actors to exploit the theme in targeted attacks, increasing the likelihood of broader security incidents within the organization.

Affected Version(s)

Woffice <= 5.4.10

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rafie Muhammad (Patchstack)
.