Cyber Posture

CVE-2024-9658

High

Published: 07 March 2025

Published
07 March 2025
Modified
13 March 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2024-9658 is a privilege escalation vulnerability via account takeover in the School Management System plugin for WordPress, affecting all versions up to and including 93.0.0. The issue stems from the plugin's failure to properly validate a user's identity before updating their details, such as email and password, through the mj_smgt_update_user() and mj_smgt_add_admission() functions, combined with a local file inclusion vulnerability. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function).

Authenticated attackers with student-level access or higher can exploit this vulnerability remotely over the network with low complexity. By leveraging the flawed functions, they can arbitrarily change any user's email address and password, including those of administrators, enabling full account takeover and escalation to higher privileges.

Advisories from Wordfence detail the vulnerability in their threat intelligence report, while the plugin's Codecanyon page provides general information on the School Management System. No patches or mitigations are available, as the vulnerability remains unaddressed despite outreach four months prior to public disclosure on March 7, 2025.

The flaw was escalated publicly after no response from the plugin maintainers, leaving installations exposed with no known fixes.

Details

CWE(s)
CWE-288CWE-306

Affected Products

dasinfomedia
school management system
≤ 93.0.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability is explicitly a privilege escalation via unauthorized account modification (password/email changes) in a public-facing WordPress plugin, allowing low-privileged authenticated users to take over admin accounts.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References