CVE-2017-20099

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on WordPress sites running the vulnerable Analytics Stats Counter Statistics Plugin. Attackers can inject malicious code through unspecified input processing, potentially taking full control of affected websites. All WordPress installations using this plugin version are at risk.

💻 Affected Systems

Products:
  • Analytics Stats Counter Statistics Plugin for WordPress
Versions: 1.2.2.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin version installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WordPress site with attacker gaining administrative privileges, installing backdoors, stealing sensitive data, and using the server for further attacks.

🟠

Likely Case

Website defacement, malware injection, credential theft, and unauthorized access to site content and databases.

🟢

If Mitigated

Limited impact with proper web application firewalls and input validation, potentially blocking the injection attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote code injection vulnerabilities in WordPress plugins are frequently exploited in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version or remove plugin

Vendor Advisory: https://wordpress.org/plugins/analytics-stats-counter-statistics/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Analytics Stats Counter Statistics Plugin
4. Click 'Update Now' if available
5. If no update, deactivate and delete the plugin
6. Consider alternative analytics plugins

🔧 Temporary Workarounds

Immediate Plugin Deactivation

all

Temporarily disable the vulnerable plugin to prevent exploitation

wp plugin deactivate analytics-stats-counter-statistics

Web Application Firewall Rule

all

Block suspicious requests targeting the plugin

Add WAF rule to block requests containing suspicious patterns targeting /wp-content/plugins/analytics-stats-counter-statistics/

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all plugin inputs
  • Deploy web application firewall with specific rules for this plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Analytics Stats Counter Statistics' version 1.2.2.5

Check Version:

wp plugin get analytics-stats-counter-statistics --field=version

Verify Fix Applied:

Verify plugin is either updated to newer version or completely removed from plugins directory

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin files
  • PHP code execution attempts in web server logs
  • Unauthorized file modifications in wp-content/plugins/analytics-stats-counter-statistics/

Network Indicators:

  • HTTP requests containing suspicious payloads targeting the plugin endpoint
  • Unexpected outbound connections from web server

SIEM Query:

source="web_server_logs" AND (uri="*analytics-stats-counter-statistics*" AND (method="POST" OR status="200"))

🔗 References

📤 Share & Export