CVE-2024-31210: WordPress Plugin Upload Vulnerability Exploiting Remote Code Execution

image

Summary

Administrative users on single-site setups and Super Admin-level users on Multisite setups could capitalize on a loophole in the plugin upload system. If they tried uploading a file that wasn’t a zip file as a new plugin through the Plugins -> Add New -> Upload Plugin interface and were prompted for FTP credentials, the uploaded file lingered momentarily in the Media Library, despite not being permitted. This created a window for potentially executing arbitrary PHP code.

Affected Versions:

WordPress below 4.1.39
WordPress from 4.2 to 4.2.36
WordPress from 4.3 to 4.3.32
WordPress from 4.4 to 4.4.31
WordPress from 4.5 to 4.5.30
WordPress from 4.6 to 4.6.27
WordPress from 4.7 to 4.7.27
WordPress from 4.8 to 4.8.23
WordPress from 4.9 to 4.9.24
WordPress from 5.0 to 5.0.20
WordPress from 5.1 to 5.1.17
WordPress from 5.2 to 5.2.19
WordPress from 5.3 to 5.3.16
WordPress from 5.4 to 5.4.14
WordPress from 5.5 to 5.5.13
WordPress from 5.6 to 5.6.12
WordPress from 5.7 to 5.7.10
WordPress from 5.8 to 5.8.8
WordPress from 5.9 to 5.9.8
WordPress from 6.0 to 6.0.6
WordPress from 6.1 to 6.1.4
WordPress from 6.2 to 6.2.3
WordPress from 6.3 to 6.3.2
WordPress from 6.4 to 6.4.2

Exploitable: Administrators of single-site setups and Super Admins of Multisite setups have the capability to execute PHP code arbitrarily.

Not Exploitable: Users with lower privileges remain unaffected. Websites with the DISALLOW_FILE_MODS constant set to true are unaffected. Websites where administrative users don’t require FTP credentials or lack access to valid FTP credentials are also unaffected.

References

https://nvd.nist.gov/vuln/detail/CVE-2024-31210

Found this article interesting? Follow us on X and LinkedIn to read more exclusive content we post.