CVE-2024-2417
WordPress vulnerability analysis and mitigation

Overview

The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin is affected by a privilege escalation vulnerability (CVE-2024-2417) in versions up to and including 3.1.5. The vulnerability stems from a missing capability check in the formsaveaction() function, which was discovered and reported in May 2024 (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue exists due to a missing capability check in the formsaveaction() function, allowing authenticated users with subscriber-level access or higher to modify the registration form settings (Wordfence).

Impact

The vulnerability allows authenticated attackers with subscriber-level access or higher to update the registration form and set the default registration role to administrator. This enables attackers to subsequently register new accounts with administrator privileges, potentially leading to complete site compromise (NVD).

Mitigation and workarounds

The vulnerability has been patched in a security update. Site administrators are strongly advised to update to the latest version of the plugin. The fix includes implementing proper capability checks in the formsaveaction() function (GitHub Commit).

Community reactions

The vulnerability was discovered through Wordfence's bug bounty program, resulting in a $2,063 bounty being awarded to the researcher (Wordfence).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management