CVE-2012-10020
📋 TL;DR
The FoxyPress WordPress plugin versions up to 0.4.2.1 allow unauthenticated attackers to upload arbitrary files due to missing file type validation in uploadify.php. This vulnerability enables remote code execution by uploading malicious files like PHP shells. Any WordPress site using vulnerable FoxyPress plugin versions is affected.
💻 Affected Systems
- WordPress FoxyPress Plugin
📦 What is this software?
Foxypress by Webmovementllc
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.
Likely Case
Attackers upload web shells to gain persistent access, deface websites, or install cryptocurrency miners.
If Mitigated
File uploads blocked or monitored, preventing successful exploitation while maintaining plugin functionality.
🎯 Exploit Status
Metasploit module available; exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 0.4.2.2 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/555071
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find FoxyPress plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.
🔧 Temporary Workarounds
Block uploadify.php access
linuxAdd .htaccess rule to block access to vulnerable uploadify.php file
<Files "uploadify.php">
Order Allow,Deny
Deny from all
</Files>
Web Application Firewall rule
allBlock requests to uploadify.php containing file uploads
WAF rule: Block POST requests to */wp-content/plugins/foxypress/uploadify.php with file upload content
🧯 If You Can't Patch
- Immediately deactivate and remove the FoxyPress plugin from all WordPress installations
- Implement strict file upload validation and monitoring on web server
🔍 How to Verify
Check if Vulnerable:
Check WordPress plugin directory for FoxyPress plugin version <= 0.4.2.1
Check Version:
grep -r "Version:" /path/to/wordpress/wp-content/plugins/foxypress/ | head -1
Verify Fix Applied:
Verify FoxyPress plugin version is 0.4.2.2 or higher, or plugin is completely removed
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-content/plugins/foxypress/uploadify.php
- File uploads with suspicious extensions (.php, .phtml, .phar)
Network Indicators:
- HTTP POST to uploadify.php with file upload content
- Unusual outbound connections from web server after file upload
SIEM Query:
source="web_logs" AND uri="/wp-content/plugins/foxypress/uploadify.php" AND method="POST"
🔗 References
- https://packetstormsecurity.com/files/113576/
- https://plugins.trac.wordpress.org/changeset/555071
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/wp_foxypress_upload.rb
- https://web.archive.org/web/20210120060045/https%3A//www.securityfocus.com/bid/53805/info
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fbc88da-8944-433c-b94d-9604ffe13d8a?source=cve