Email Log Vulnerability – Unauthenticated Hook Injection – CVE-2024-0867 | WordPress Plugin Vulnerability Report

Plugin Name: Email Log

Key Information:

  • Software Type: Plugin
  • Software Slug: email-log
  • Software Status: Active
  • Software Author: sudar
  • Software Downloads: 80,000
  • Active Installs: 736,687
  • Last Updated: May 23, 2024
  • Patched Versions: 2.4.9
  • Affected Versions: <= 2.4.8

Vulnerability Details:

  • Name: Email Log <= 2.4.8 - Unauthenticated Hook Injection
  • Type: Improper Control of Generation of Code ('Code Injection')
  • CVE: CVE-2024-0867
  • CVSS Score: 8.1 (High)
  • Publicly Published: May 23, 2024
  • Researcher: Sean Murphy
  • Description: The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement.

Summary:

The Email Log plugin for WordPress has a vulnerability in versions up to and including 2.4.8 that allows for Unauthenticated Hook Injection via the check_nonce function. This vulnerability has been patched in version 2.4.9.

Detailed Overview:

Researcher Sean Murphy discovered an Unauthenticated Hook Injection vulnerability in the Email Log plugin for WordPress. The vulnerability, which affects versions up to and including 2.4.8, is located in the check_nonce function. It allows unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. For the vulnerability to be exploitable, the action the attacker wishes to execute needs to have a nonce check, the nonce needs to be known to the attacker, and there must be an absence of a capability check.

Advice for Users:

  1. Immediate Action: Users should update to version 2.4.9 or later of the Email Log plugin to ensure their WordPress installations are protected from this vulnerability.
  2. Check for Signs of Vulnerability: Users should review their WordPress site for any unusual behavior or unauthorized changes that may indicate a compromise.
  3. Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
  4. Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.

The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.4.9 or later to secure their WordPress installations.

References:

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/email-log

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/email-log/email-log-248-unauthenticated-hook-injection

Detailed Report:

As a website owner, keeping your site secure should always be a top priority. Today, we bring to your attention a critical vulnerability discovered in the popular Email Log plugin for WordPress. This vulnerability, identified as CVE-2024-0867, affects all versions of the plugin up to and including 2.4.8 and puts thousands of websites at risk of unauthorized access and potential compromise.

About the Email Log Plugin

The Email Log plugin for WordPress, developed by Sudar, is a popular tool that allows website owners to keep track of emails sent from their sites. With over 736,000 active installations and 80,000 downloads, this plugin is widely used by the WordPress community. However, the recent discovery of a severe vulnerability has put many of these websites at risk.

Details of the Vulnerability

Researcher Sean Murphy discovered an Unauthenticated Hook Injection vulnerability in the Email Log plugin. The vulnerability, which affects versions up to and including 2.4.8, is located in the check_nonce function. It allows unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. For the vulnerability to be exploitable, the action the attacker wishes to execute needs to have a nonce check, the nonce needs to be known to the attacker, and there must be an absence of a capability check.

Risks and Potential Impacts

The Unauthenticated Hook Injection vulnerability in the Email Log plugin has been assigned a CVSS score of 8.1 (High), indicating its severity. If exploited, this vulnerability could allow attackers to execute malicious code on your WordPress site, potentially leading to unauthorized access, data theft, or even complete site compromise. This puts your website, its data, and your users' information at risk.

How to Remediate the Vulnerability

To protect your WordPress site from this vulnerability, it is crucial to take immediate action. The Email Log plugin developers have released a patched version, 2.4.9, which addresses the Unauthenticated Hook Injection issue. We strongly advise all users to update their Email Log plugin to version 2.4.9 or later as soon as possible. Additionally, we recommend reviewing your WordPress site for any unusual behavior or unauthorized changes that may indicate a compromise.

Previous Vulnerabilities

It is worth noting that the Email Log plugin has had a history of vulnerabilities. Since November 2017, there have been three previous vulnerabilities reported. This highlights the importance of staying vigilant and keeping your plugins up to date to ensure your website's security.

The Importance of Staying on Top of Security Vulnerabilities

As a small business owner managing a WordPress website, it can be challenging to stay on top of the ever-evolving landscape of online threats. However, neglecting the security of your website can have severe consequences, such as data breaches, loss of customer trust, and damage to your brand reputation. By regularly updating your WordPress core, themes, and plugins, as well as implementing security best practices, you can significantly reduce the risk of falling victim to vulnerabilities like the one found in the Email Log plugin.

If you are unsure about how to proceed or need assistance in ensuring your website's security, don't hesitate to reach out to a professional WordPress support service or a trusted web developer. They can help you navigate the complexities of website security and provide you with the peace of mind that comes with knowing your online presence is protected.

As a business owner, you don't have time to constantly monitor for WordPress vulnerabilities like this. At Your WP Guy, we become your outsourced IT team to handle security, updates, maintenance and support. Let us fully audit your site and plugins to assess any impact from this issue. We'll update everything to patched versions so you can rest easy knowing your site is locked down.

Focus on your business goals while we focus on your WordPress site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 for a free consultation on securing your online presence.

Email Log Vulnerability – Unauthenticated Hook Injection – CVE-2024-0867 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment