CVE-2024-9658: CWE-288 Authentication Bypass Using an Alternate Path or Channel in dasinfomedia School Management System for Wordpress
The School Management System for Wordpress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 93.0.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email and password through the mj_smgt_update_user() and mj_smgt_add_admission() functions, along with a local file inclusion vulnerability. This makes it possible for authenticated attackers, with student-level access and above, to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account. This was escalated four months ago after no response to our initial outreach, yet it still vulnerable.
AI Analysis
Technical Summary
The School Management System for WordPress plugin by dasinfomedia suffers from an authentication bypass vulnerability (CWE-288) that enables privilege escalation via account takeover. The flaw arises because the plugin does not properly validate user identity before allowing updates to sensitive user details such as email and password through the mj_smgt_update_user() and mj_smgt_add_admission() functions. Additionally, a local file inclusion vulnerability is present. Authenticated attackers with at least student-level privileges can exploit this to change credentials of any user, including administrators, thereby gaining unauthorized access to higher-privilege accounts. The vulnerability affects all versions up to and including 93.0.0. There is no vendor patch or advisory available, and no known exploits in the wild have been reported.
Potential Impact
Successful exploitation allows an attacker with low-level authenticated access to escalate privileges by taking over accounts of other users, including administrators. This leads to full compromise of the affected WordPress site using the plugin, with confidentiality, integrity, and availability impacts rated high (CVSS 8.8). The vulnerability can result in unauthorized administrative control and potential site takeover.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or patch has been published as of the provided data. Until a patch is available, restrict access to trusted users only and consider disabling or removing the vulnerable plugin to prevent exploitation. Monitor for updates from dasinfomedia or WordPress plugin repositories for an official fix.
CVE-2024-9658: CWE-288 Authentication Bypass Using an Alternate Path or Channel in dasinfomedia School Management System for Wordpress
Description
The School Management System for Wordpress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 93.0.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email and password through the mj_smgt_update_user() and mj_smgt_add_admission() functions, along with a local file inclusion vulnerability. This makes it possible for authenticated attackers, with student-level access and above, to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account. This was escalated four months ago after no response to our initial outreach, yet it still vulnerable.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The School Management System for WordPress plugin by dasinfomedia suffers from an authentication bypass vulnerability (CWE-288) that enables privilege escalation via account takeover. The flaw arises because the plugin does not properly validate user identity before allowing updates to sensitive user details such as email and password through the mj_smgt_update_user() and mj_smgt_add_admission() functions. Additionally, a local file inclusion vulnerability is present. Authenticated attackers with at least student-level privileges can exploit this to change credentials of any user, including administrators, thereby gaining unauthorized access to higher-privilege accounts. The vulnerability affects all versions up to and including 93.0.0. There is no vendor patch or advisory available, and no known exploits in the wild have been reported.
Potential Impact
Successful exploitation allows an attacker with low-level authenticated access to escalate privileges by taking over accounts of other users, including administrators. This leads to full compromise of the affected WordPress site using the plugin, with confidentiality, integrity, and availability impacts rated high (CVSS 8.8). The vulnerability can result in unauthorized administrative control and potential site takeover.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. No official fix or patch has been published as of the provided data. Until a patch is available, restrict access to trusted users only and consider disabling or removing the vulnerable plugin to prevent exploitation. Monitor for updates from dasinfomedia or WordPress plugin repositories for an official fix.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-10-08T20:07:34.693Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b56b7ef31ef0b553133
Added to database: 2/25/2026, 9:36:22 PM
Last enriched: 4/9/2026, 8:46:00 AM
Last updated: 4/11/2026, 11:27:45 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.