Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9637: CWE-639 Authorization Bypass Through User-Controlled Key in jdsofttech School Management System – WPSchoolPress

0
High
VulnerabilityCVE-2024-9637cvecve-2024-9637cwe-639
Published: Sat Oct 26 2024 (10/26/2024, 08:36:00 UTC)
Source: CVE Database V5
Vendor/Project: jdsofttech
Product: School Management System – WPSchoolPress

Description

CVE-2024-9637 is a high-severity vulnerability in the jdsofttech School Management System – WPSchoolPress WordPress plugin, affecting all versions up to 2. 2. 10. It allows authenticated users with teacher-level privileges or higher to escalate their privileges by changing arbitrary users' email addresses without proper identity validation. This flaw enables attackers to reset passwords of targeted accounts, including administrators, leading to full account takeover. The vulnerability stems from improper authorization checks (CWE-639) during user detail updates. Exploitation requires no user interaction and can be performed remotely over the network. Although no known exploits are reported in the wild yet, the high CVSS score of 8. 8 reflects the critical impact on confidentiality, integrity, and availability. Organizations using this plugin should urgently apply patches once available or implement strict access controls and monitoring to mitigate risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:31:34 UTC

Technical Analysis

The vulnerability identified as CVE-2024-9637 affects the School Management System – WPSchoolPress plugin for WordPress, versions up to and including 2.2.10. The root cause is an authorization bypass due to improper validation of user identity when updating user details such as email addresses. Authenticated users with teacher-level access or higher can exploit this flaw to modify the email addresses of any user, including administrators. By changing an administrator's email, the attacker can trigger a password reset process, gaining unauthorized access to the administrator account and escalating privileges. This vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. No patches were linked at the time of reporting, and no active exploits have been observed in the wild. The vulnerability poses a significant risk to the security of educational institutions and organizations relying on this plugin for managing sensitive user data and administrative functions.

Potential Impact

The impact of CVE-2024-9637 is substantial for organizations using the WPSchoolPress plugin. Successful exploitation allows attackers to take over administrator accounts, leading to full control over the affected WordPress site. This can result in unauthorized access to sensitive student and staff data, manipulation or deletion of records, disruption of school management operations, and potential deployment of further malicious activities such as malware installation or ransomware. The breach of administrator credentials compromises the entire site’s security posture, potentially affecting all users and integrated systems. Given the plugin’s role in managing educational environments, the confidentiality, integrity, and availability of critical educational data and services are at high risk. The ease of exploitation by users with teacher-level privileges exacerbates the threat, as such accounts are commonly present in school environments.

Mitigation Recommendations

Immediate mitigation steps include restricting teacher-level user privileges to the minimum necessary and monitoring account activities for suspicious email changes or password reset requests. Administrators should enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account takeover. Network-level protections like web application firewalls (WAFs) can be configured to detect and block anomalous requests attempting to modify user emails. Since no official patch was available at the time of reporting, organizations should closely monitor vendor communications for updates and apply patches promptly once released. Additionally, conducting regular audits of user accounts and access logs can help identify exploitation attempts early. If possible, temporarily disabling or limiting the plugin’s user update functionality until a fix is applied can reduce exposure. Educating staff about the risks of privilege misuse and ensuring least privilege principles are enforced will further mitigate risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-10-08T16:50:22.333Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b56b7ef31ef0b553079

Added to database: 2/25/2026, 9:36:22 PM

Last enriched: 2/25/2026, 11:31:34 PM

Last updated: 2/26/2026, 8:06:54 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats