Platform
wordpress
Component
wp-time-capsule
Opgelost in
1.22.21
CVE-2024-38770 describes a Privilege Escalation vulnerability within the Backup and Staging by WP Time Capsule WordPress plugin. This flaw allows attackers to bypass authentication mechanisms and gain unauthorized access with elevated privileges. The vulnerability impacts versions of the plugin up to and including 1.22.20, and a patch is available in version 1.22.21.
The impact of this vulnerability is severe. Successful exploitation allows an attacker to bypass authentication entirely, effectively granting them administrative-level access to the WordPress site. This could lead to complete compromise of the website, including data exfiltration, modification of content, installation of malicious code, and even complete site takeover. Given the plugin's function of creating backups and staging environments, an attacker could also potentially access sensitive data stored within these backups, further amplifying the impact. The ease of exploitation, combined with the plugin's popularity, makes this a high-priority risk.
This vulnerability was publicly disclosed on August 1, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge given the vulnerability's nature and severity.
Websites using the Backup and Staging by WP Time Capsule plugin, particularly those running older versions (≤1.22.20), are at significant risk. Shared hosting environments where plugin updates are managed by the hosting provider are also at risk if they have not yet applied the update. Sites with weak password policies or those that have not implemented multi-factor authentication are especially vulnerable.
• wordpress / composer / npm:
wp plugin list | grep "Backup and Staging by WP Time Capsule"• wordpress / composer / npm:
wp plugin update --all• wordpress / composer / npm:
grep -r "Revmakx Backup and Staging" /var/log/apache2/access.log | tail -n 10• wordpress / composer / npm:
wp option get plugin_active_plugins | grep "wp-time-capsule/wp-time-capsule.php"disclosure
Exploit Status
EPSS
0.14% (33% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation is to immediately upgrade the Backup and Staging by WP Time Capsule plugin to version 1.22.21 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting access to the plugin's administrative interface. While not a complete solution, this can limit the potential attack surface. Review user roles and permissions to ensure the principle of least privilege is enforced. Monitor WordPress logs for any suspicious activity related to the plugin, such as unusual login attempts or unauthorized file modifications. After upgrading, verify the plugin's functionality by performing a test backup and restore to ensure the upgrade did not introduce any new issues.
Actualice el plugin Backup and Staging by WP Time Capsule a la última versión disponible. La vulnerabilidad se encuentra en versiones iguales o anteriores a la 1.22.20. La actualización corregirá la vulnerabilidad de escalada de privilegios y omisión de autenticación.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2024-38770 is a CRITICAL vulnerability in the Backup and Staging by WP Time Capsule plugin for WordPress, allowing attackers to bypass authentication and gain elevated privileges.
Yes, if you are using Backup and Staging by WP Time Capsule version 1.22.20 or earlier, you are affected by this vulnerability.
Upgrade the Backup and Staging by WP Time Capsule plugin to version 1.22.21 or later to remediate the vulnerability.
While no confirmed active exploitation campaigns have been reported, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation.
Refer to the official Backup and Staging by WP Time Capsule website or the WordPress plugin repository for the latest advisory and update information.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.