CVE-2017-1002008
📋 TL;DR
This vulnerability allows unauthenticated attackers to download any file from WordPress sites running the vulnerable 'Membership Simplified for OAP Members Only' plugin. Attackers can bypass authentication entirely and access protected files without any credentials. All WordPress installations using version 1.58 of this plugin are affected.
💻 Affected Systems
- Membership Simplified for OAP Members Only WordPress Plugin
📦 What is this software?
Membership Simplified by Membership Simplified Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers download sensitive files containing user data, credentials, configuration secrets, or proprietary content, leading to complete data breach and potential follow-on attacks.
Likely Case
Unauthorized access to protected content, member-only files, or sensitive documents that should require authentication.
If Mitigated
No impact if proper authentication checks are implemented or plugin is disabled/removed.
🎯 Exploit Status
Simple HTTP GET requests to download.php with file parameters can bypass authentication. Exploit code is publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.59 or later
Vendor Advisory: https://wordpress.org/plugins/membership-simplified-for-oap-members-only
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Membership Simplified for OAP Members Only'. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin.
🔧 Temporary Workarounds
Disable vulnerable plugin
allDeactivate the plugin to prevent exploitation while waiting for patch
Block access to download.php
linuxUse web server configuration to block direct access to the vulnerable file
# For Apache: add to .htaccess
<Files "download.php">
Order Allow,Deny
Deny from all
</Files>
# For Nginx: add to server block
location ~* /wp-content/plugins/membership-simplified-for-oap-members-only/download\.php$ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Immediately deactivate and remove the plugin from all WordPress installations
- Implement web application firewall rules to block requests to download.php with file parameters
🔍 How to Verify
Check if Vulnerable:
Check if /wp-content/plugins/membership-simplified-for-oap-members-only/download.php exists and is accessible without authentication. Try accessing it directly via browser or curl.
Check Version:
# Check WordPress plugin version via database
SELECT * FROM wp_options WHERE option_name LIKE '%membership-simplified%';
Verify Fix Applied:
After update, verify plugin version is 1.59+ in WordPress admin panel and test that download.php now requires authentication.
📡 Detection & Monitoring
Log Indicators:
- HTTP 200 responses to /wp-content/plugins/membership-simplified-for-oap-members-only/download.php without preceding authentication logs
- Unusual file download patterns from the plugin directory
Network Indicators:
- GET requests to download.php with file= parameters from unauthenticated sources
- Traffic spikes to the plugin's download endpoint
SIEM Query:
source="web_server" AND uri="/wp-content/plugins/membership-simplified-for-oap-members-only/download.php" AND NOT (user_agent="WordPress/*" OR referer="*wp-admin*")
🔗 References
- http://www.vapidlabs.com/advisory.php?v=187
- https://wordpress.org/plugins/membership-simplified-for-oap-members-only
- https://wpvulndb.com/vulnerabilities/8777
- https://www.exploit-db.com/exploits/41622/
- http://www.vapidlabs.com/advisory.php?v=187
- https://wordpress.org/plugins/membership-simplified-for-oap-members-only
- https://wpvulndb.com/vulnerabilities/8777
- https://www.exploit-db.com/exploits/41622/