Security Optimizer Vulnerability – Missing Authorization via hide_notice() – CVE-2024-38774 | WordPress Plugin Vulnerability Report
Plugin Name: Security Optimizer – The All-In-One Protection Plugin
Key Information:
- Software Type: Plugin
- Software Slug: sg-security
- Software Status: Active
- Software Author: siteground
- Software Downloads: 22,051,479
- Active Installs: 1,000,000
- Last Updated: July 29, 2024
- Patched Versions: 1.5.1
- Affected Versions: <= 1.5.0
Vulnerability Details:
- Name: Security Optimizer – The All-In-One Protection Plugin <= 1.5.0
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
- CVE: CVE-2024-38774
- CVSS Score: 4.3
- Publicly Published: July 19, 2024
- Researcher: Rafie Muhammad - Patchstack
- Description: The Security Optimizer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check in the
hide_notice()
function. This issue affects versions up to and including 1.5.0, allowing authenticated attackers with subscriber-level access or higher to dismiss administrative notices.
Summary:
The Security Optimizer plugin for WordPress has a vulnerability in versions up to and including 1.5.0 that allows unauthorized users to modify data by dismissing administrative notices. This vulnerability has been patched in version 1.5.1.
Detailed Overview:
The vulnerability, identified by researcher Rafie Muhammad from Patchstack, involves a lack of proper capability checks in the hide_notice()
function. This oversight allows users with minimal access privileges, such as subscribers, to dismiss notices that should be restricted to higher-level administrators. While this vulnerability does not directly lead to data theft or system compromise, it could potentially disrupt site management and user communication.
Advice for Users:
Immediate Action: Users are strongly encouraged to update the Security Optimizer plugin to version 1.5.1 or later to ensure that their websites are protected from this vulnerability. Check for Signs of Vulnerability: Monitor your site’s administrative logs for unusual activity, such as unexpected dismissals of notices, which may indicate exploitation of this vulnerability. Alternate Plugins: While the issue has been patched, users may consider reviewing other security plugins that offer similar functionality with strong security records. Stay Updated: Regularly updating all plugins and the WordPress core is crucial to maintaining website security and preventing vulnerabilities.
Conclusion:
The rapid response from the Security Optimizer developers to address this vulnerability highlights the importance of timely updates. Website owners should ensure they are using version 1.5.1 or later to maintain the integrity and security of their WordPress installations.