WordPress Frontend Admin 3.19.4: Unauth Priv Esc via fea_encrypt Encryption Bypass
CVE-2024-3729 Published on May 2, 2024

Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryption Exception Handling to Form Manipulation
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not loaded on the server.

NVD

Timeline

Discovered

Vendor Notified

Disclosed 6 days later.

Weakness Type

What is a Failing Open Vulnerability?

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions. By entering a less secure state, the product inherits the weaknesses associated with that state, making it easier to compromise. At the least, it causes administrators to have a false sense of security. This weakness typically occurs as a result of wanting to "fail functional" to minimize administration and support costs, instead of "failing safe."

CVE-2024-3729 has been classified to as a Failing Open vulnerability or weakness.


Products Associated with CVE-2024-3729

stack.watch emails you whenever new vulnerabilities are published in Dynamiapps Frontend Admin or WordPress Frontend Admin By Dynamiapps. Just hit a watch button to start following.

 
 

Affected Versions

shabti Frontend Admin by DynamiApps: wordpress frontend_admin_by_dynamiapps:

Exploit Probability

EPSS
0.55%
Percentile
67.93%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.