Email Log Vulnerability – Unauthenticated Hook Injection – CVE-2024-0867 | WordPress Plugin Vulnerability Report
Plugin Name: Email Log
Key Information:
- Software Type: Plugin
- Software Slug: email-log
- Software Status: Active
- Software Author: sudar
- Software Downloads: 80,000
- Active Installs: 736,687
- Last Updated: May 23, 2024
- Patched Versions: 2.4.9
- Affected Versions: <= 2.4.8
Vulnerability Details:
- Name: Email Log <= 2.4.8 - Unauthenticated Hook Injection
- Type: Improper Control of Generation of Code ('Code Injection')
- CVE: CVE-2024-0867
- CVSS Score: 8.1 (High)
- Publicly Published: May 23, 2024
- Researcher: Sean Murphy
- Description: The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement.
Summary:
The Email Log plugin for WordPress has a vulnerability in versions up to and including 2.4.8 that allows for Unauthenticated Hook Injection via the check_nonce function. This vulnerability has been patched in version 2.4.9.
Detailed Overview:
Researcher Sean Murphy discovered an Unauthenticated Hook Injection vulnerability in the Email Log plugin for WordPress. The vulnerability, which affects versions up to and including 2.4.8, is located in the check_nonce function. It allows unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. For the vulnerability to be exploitable, the action the attacker wishes to execute needs to have a nonce check, the nonce needs to be known to the attacker, and there must be an absence of a capability check.
Advice for Users:
- Immediate Action: Users should update to version 2.4.9 or later of the Email Log plugin to ensure their WordPress installations are protected from this vulnerability.
- Check for Signs of Vulnerability: Users should review their WordPress site for any unusual behavior or unauthorized changes that may indicate a compromise.
- Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.4.9 or later to secure their WordPress installations.
References:
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/email-log
Detailed Report:
As a business owner, you don't have time to constantly monitor for WordPress vulnerabilities like this. At Your WP Guy, we become your outsourced IT team to handle security, updates, maintenance and support. Let us fully audit your site and plugins to assess any impact from this issue. We'll update everything to patched versions so you can rest easy knowing your site is locked down.
Focus on your business goals while we focus on your WordPress site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 for a free consultation on securing your online presence.