WordPress Frontend Admin 3.19.4: Unauth Priv Esc via fea_encrypt Encryption Bypass
CVE-2024-3729 Published on May 2, 2024
Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryption Exception Handling to Form Manipulation
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not loaded on the server.
Timeline
Discovered
Vendor Notified
Disclosed 6 days later.
Weakness Type
What is a Failing Open Vulnerability?
When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions. By entering a less secure state, the product inherits the weaknesses associated with that state, making it easier to compromise. At the least, it causes administrators to have a false sense of security. This weakness typically occurs as a result of wanting to "fail functional" to minimize administration and support costs, instead of "failing safe."
CVE-2024-3729 has been classified to as a Failing Open vulnerability or weakness.
Products Associated with CVE-2024-3729
stack.watch emails you whenever new vulnerabilities are published in Dynamiapps Frontend Admin or WordPress Frontend Admin By Dynamiapps. Just hit a watch button to start following.
Affected Versions
shabti Frontend Admin by DynamiApps:- Before and including 3.19.4 is affected.
- Version -, <= 3.19.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.