CVE-2024-10591
Published: 30 January 2025
Description
The MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hubwoo_save_updates() function in all versions up to, and including, 1.5.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Security Summary
CVE-2024-10591 affects the MWB HubSpot for WooCommerce – CRM, Abandoned Cart, Email Marketing, Marketing Automation & Analytics plugin for WordPress in all versions up to and including 1.5.9. The vulnerability stems from a missing capability check on the hubwoo_save_updates() function, enabling unauthorized modification of data that can lead to privilege escalation, as classified under CWE-862. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-30.
Authenticated attackers with Contributor-level access or higher can exploit this issue remotely without user interaction. By calling the vulnerable function, they can update arbitrary WordPress options, such as changing the default role for new user registrations to administrator and enabling user registration. This allows attackers to create administrative accounts and gain full control over the site.
Advisories reference the vulnerable code in class-hubwoo-ajax-handler.php at line 845, a patch in changeset 3231984, and Wordfence threat intelligence detailing the issue. Security practitioners should update to a patched version beyond 1.5.9 to mitigate the risk.
Details
- CWE(s)