Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3729: CWE-636 Not Failing Securely ('Failing Open') in shabti Frontend Admin by DynamiApps

0
Critical
VulnerabilityCVE-2024-3729cvecve-2024-3729cwe-636
Published: Thu May 02 2024 (05/02/2024, 16:52:28 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

CVE-2024-3729 is a critical vulnerability in the Frontend Admin by DynamiApps WordPress plugin affecting all versions up to 3. 19. 4. It arises from improper handling of encryption exceptions in the 'fea_encrypt' function, specifically when the PHP 'openssl' extension is not loaded. This flaw allows unauthenticated attackers to manipulate user processing forms, enabling privilege escalation by adding or editing administrator accounts, authentication bypass by automatic user login, and arbitrary web script injection via post processing forms. The vulnerability has a CVSS score of 9. 8, indicating critical severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using this plugin without the 'openssl' PHP extension are at significant risk. Immediate patching or mitigation is essential to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:25:06 UTC

Technical Analysis

CVE-2024-3729 is a critical security vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to and including 3.19.4. The root cause is improper exception handling in the 'fea_encrypt' function, which fails securely when the PHP 'openssl' extension is missing. Normally, encryption functions rely on 'openssl' for secure cryptographic operations; however, if 'openssl' is not loaded, the plugin does not handle the failure properly and continues processing, effectively 'failing open'. This failure mode allows unauthenticated attackers to manipulate user processing forms. Specifically, attackers can add or edit administrator users, leading to privilege escalation, bypass authentication by automatically logging in users, and inject arbitrary web scripts through post processing forms, potentially enabling cross-site scripting (XSS) or other injection attacks. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 score of 9.8 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the severity and ease of exploitation make this a high-risk vulnerability for WordPress sites using this plugin without the 'openssl' PHP extension. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-3729 is severe for organizations running WordPress sites with the Frontend Admin by DynamiApps plugin without the 'openssl' PHP extension. Attackers can gain administrative privileges without authentication, effectively taking full control of the website. This enables unauthorized access to sensitive data, modification or deletion of content, and the ability to inject malicious scripts that can compromise visitors or further propagate attacks. The authentication bypass undermines the trust model of the site, while arbitrary script injection can lead to widespread malware distribution or phishing campaigns. The vulnerability also threatens website availability if attackers disrupt or deface the site. Organizations relying on this plugin for administrative functions face significant risks of data breaches, reputational damage, and potential regulatory penalties. The ease of exploitation and lack of required privileges mean that even low-skilled attackers can leverage this flaw, increasing the likelihood of attacks globally.

Mitigation Recommendations

To mitigate CVE-2024-3729, organizations should first verify that the PHP 'openssl' extension is installed and enabled on their web servers, as the vulnerability only manifests when this extension is missing. Enabling 'openssl' ensures proper cryptographic operations and prevents the plugin from failing open. Additionally, administrators should update the Frontend Admin by DynamiApps plugin to the latest version once a patch is released by the vendor. Until a patch is available, consider disabling or removing the plugin to eliminate exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting user processing forms can provide temporary protection. Regularly audit user accounts for unauthorized administrator additions or changes. Monitoring logs for unusual authentication or form submission activity can help detect exploitation attempts early. Finally, maintain a robust backup and incident response plan to recover quickly if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-12T18:15:54.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c9bb7ef31ef0b566c21

Added to database: 2/25/2026, 9:41:47 PM

Last enriched: 2/26/2026, 6:25:06 AM

Last updated: 2/26/2026, 8:07:28 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats