CVE-2016-15033

9.8 CRITICAL

📋 TL;DR

The Delete All Comments WordPress plugin up to version 2.0 contains an arbitrary file upload vulnerability in delete-all-comments.php due to missing file type validation. Unauthenticated attackers can upload malicious files to vulnerable WordPress sites, potentially leading to remote code execution. This affects all WordPress installations using the vulnerable plugin versions.

💻 Affected Systems

Products:
  • WordPress Delete All Comments Plugin
Versions: All versions up to and including 2.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.

🟠

Likely Case

Attackers upload web shells to gain persistent access, deface websites, or install cryptocurrency miners.

🟢

If Mitigated

File uploads blocked or restricted to safe file types, preventing malicious file execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill due to public proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.0

Vendor Advisory: https://wordpress.org/plugins/delete-all-comments/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Delete All Comments plugin. 4. Click Update Now if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate and delete the vulnerable plugin to eliminate the attack vector.

wp plugin deactivate delete-all-comments
wp plugin delete delete-all-comments

Web Server File Restriction

linux

Configure web server to block access to delete-all-comments.php or restrict file uploads in that directory.

# In Apache .htaccess: 
<Files "delete-all-comments.php">
    Order Allow,Deny
    Deny from all
</Files>
# In Nginx config:
location ~* /delete-all-comments\.php$ {
    deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate and remove the Delete All Comments plugin from all WordPress installations.
  • Implement web application firewall rules to block requests to delete-all-comments.php and file upload attempts to the plugin directory.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Delete All Comments plugin version. If version is 2.0 or lower, system is vulnerable.

Check Version:

wp plugin get delete-all-comments --field=version

Verify Fix Applied:

Verify plugin version is higher than 2.0 or plugin is completely removed from plugins directory.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/delete-all-comments/delete-all-comments.php with file upload parameters
  • Unusual file creations in plugin directories with extensions like .php, .phtml, .php5

Network Indicators:

  • POST requests to delete-all-comments.php with multipart/form-data containing executable file uploads

SIEM Query:

source="web_server_logs" AND uri="/wp-content/plugins/delete-all-comments/delete-all-comments.php" AND method="POST" AND (user_agent CONTAINS "curl" OR user_agent CONTAINS "wget" OR user_agent="-")

🔗 References

📤 Share & Export