CVE-2015-3173

7.2 HIGH

📋 TL;DR

This vulnerability in the Custom Content Type Manager WordPress plugin allows authenticated administrators to execute arbitrary PHP code remotely. It affects WordPress sites using vulnerable versions of this plugin, potentially compromising the entire web server.

💻 Affected Systems

Products:
  • WordPress Custom Content Type Manager plugin
Versions: All versions before 0.9.8.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator-level access to WordPress dashboard to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, malware installation, or use as part of a botnet.

🟠

Likely Case

Attacker gains full control of the WordPress site and underlying server if administrator credentials are compromised.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place to detect unauthorized administrator activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.8.6 and later

Vendor Advisory: https://github.com/craftsmancoding/custom-content-type-manager/blob/master/readme.txt

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Custom Content Type Manager
4. Click 'Update Now' if available
5. If not, download version 0.9.8.6+ from WordPress repository
6. Deactivate old plugin
7. Upload and activate new version

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate custom-content-type-manager

Restrict Admin Access

linux

Implement IP whitelisting for WordPress admin area

# Add to .htaccess for Apache:
<Files "wp-login.php">
Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
</Files>

🧯 If You Can't Patch

  • Remove administrator privileges from all non-essential users
  • Implement web application firewall rules to block PHP execution attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Custom Content Type Manager version. If version is below 0.9.8.6, system is vulnerable.

Check Version:

wp plugin get custom-content-type-manager --field=version

Verify Fix Applied:

Confirm plugin version is 0.9.8.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator login patterns
  • POST requests to plugin PHP files with code parameters
  • File creation/modification in wp-content/uploads

Network Indicators:

  • HTTP requests containing eval() or system() calls in POST data
  • Outbound connections from web server to unfamiliar IPs

SIEM Query:

source="wordpress.log" AND ("custom-content-type-manager" OR "CCTM") AND ("eval" OR "system" OR "exec" OR "shell_exec")

🔗 References

📤 Share & Export