CVE-2015-5609

9.1 CRITICAL

📋 TL;DR

CVE-2015-5609 is an absolute path traversal vulnerability in the Image Export plugin for WordPress that allows attackers to read and delete arbitrary files on the server by manipulating the file parameter. This affects WordPress sites running Image Export plugin version 1.1. Attackers can access sensitive files like configuration files, password files, or database credentials.

💻 Affected Systems

Products:
  • WordPress Image Export plugin
Versions: 1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Image Export plugin version 1.1 installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like /etc/passwd, /etc/shadow, or database credentials, followed by arbitrary file deletion leading to service disruption.

🟠

Likely Case

Unauthorized access to sensitive files containing credentials or configuration data, potentially leading to further exploitation or data theft.

🟢

If Mitigated

Limited impact with proper file permissions and web server configuration restricting access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and uses simple path traversal techniques via the file parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.1 or later

Vendor Advisory: http://www.vapid.dhs.org/advisory.php?v=135

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Image Export plugin. 4. Update to version 1.1.1 or later. 5. If update not available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Image Export plugin

all

Deactivate and remove the vulnerable plugin from WordPress

wp plugin deactivate image-export
wp plugin delete image-export

Web server path restriction

all

Configure web server to block access to download.php or restrict file parameter inputs

# Apache: Add to .htaccess
<Files "download.php">
    Order Allow,Deny
    Deny from all
</Files>
# Nginx: Add to server block
location ~* /download\.php$ {
    deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate and remove the Image Export plugin from WordPress
  • Implement web application firewall rules to block requests containing path traversal patterns in the file parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins for Image Export plugin version 1.1

Check Version:

wp plugin list --name=image-export --field=version

Verify Fix Applied:

Verify plugin version is 1.1.1 or later, or confirm plugin is not installed

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/image-export/download.php with file parameter containing absolute paths like /etc/passwd
  • Multiple failed file access attempts with path traversal patterns

Network Indicators:

  • Unusual requests to download.php with file parameter containing ../ or absolute paths
  • Requests attempting to access sensitive system files

SIEM Query:

source="web_logs" AND uri="*download.php*" AND (file="*/etc/*" OR file="*../*" OR file="*C:\\*" OR file="*/root/*")

🔗 References

📤 Share & Export