🔐 CVE Alert

CVE-2024-10783

HIGH 8.1

MainWP Child <= 5.3.3 - Missing Authorization to Unauthenticated Privilege Escalation

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

The MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. This makes it possible for unauthenticated attackers to log in as an administrator on instances where MainWP Child is not yet connected to the MainWP Dashboard. IMPORTANT: this only affects sites who have MainWP Child installed and have not yet connected to the MainWP Dashboard, and do not have the unique security ID feature enabled. Sites already connected to the MainWP Dashboard plugin and do not have the unique security ID feature enabled, are NOT affected and not required to upgrade. Please note versions up to 5.3.3 contained a patch, though a bypass was discovered and not addressed until version 5.3.4.

CWE CWE-862
Vendor mainwp
Product mainwp child – securely connects to the mainwp dashboard to manage multiple sites
Published Dec 13, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for mainwp mainwp child – securely connects to the mainwp dashboard to manage multiple sites

Be the first to know when new high vulnerabilities affecting mainwp mainwp child – securely connects to the mainwp dashboard to manage multiple sites are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

mainwp / MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites
0 ≤ 5.3.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/9156e536-a58e-4d78-b136-af8a9613ee23?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-child.php#L76 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L69 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L788 wordpress.org: https://wordpress.org/plugins/mainwp-child/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197586%40mainwp-child&new=3197586%40mainwp-child&sfp_email=&sfph_mail= plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3229741%40mainwp-child&new=3229741%40mainwp-child&sfp_email=&sfph_mail=

Credits

Sean Murphy wesley