CVE-2018-20555

9.8 CRITICAL

📋 TL;DR

The Design Chemical Social Network Tabs plugin 1.7.1 for WordPress exposes Twitter API credentials (access tokens, consumer keys) in publicly accessible source code. This allows remote attackers to steal these credentials and take over associated Twitter accounts. Any WordPress site using this vulnerable plugin version is affected.

💻 Affected Systems

Products:
  • Design Chemical Social Network Tabs WordPress Plugin
Versions: 1.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin version. The vulnerability exists regardless of plugin configuration settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of associated Twitter accounts, allowing attackers to post malicious content, send DMs to followers, damage brand reputation, and potentially pivot to other connected services.

🟠

Likely Case

Attackers harvest exposed Twitter credentials to compromise social media accounts, potentially using them for spam, phishing, or spreading malware to followers.

🟢

If Mitigated

If credentials are rotated immediately after discovery and plugin is updated, impact is limited to potential brief unauthorized access before remediation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing the publicly readable PHP file containing hardcoded credentials. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.2 or later

Vendor Advisory: https://wordpress.org/plugins/social-network-tabs/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Social Network Tabs' plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and delete plugin immediately
6. Rotate all Twitter API credentials that were exposed

🔧 Temporary Workarounds

Immediate Plugin Deactivation

all

Disable the vulnerable plugin to prevent credential exposure while planning permanent fix

wp plugin deactivate social-network-tabs

File Access Restriction

linux

Temporarily restrict access to the vulnerable PHP file via web server configuration

# Apache: Add to .htaccess
<Files "dcwp_twitter.php">
    Order Allow,Deny
    Deny from all
</Files>
# Nginx: Add to server block
location ~* /dcwp_twitter\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Immediately rotate all Twitter API credentials (access tokens, consumer keys) through Twitter Developer Portal
  • Remove or disable the Social Network Tabs plugin completely and use alternative social media integration solutions

🔍 How to Verify

Check if Vulnerable:

Access https://yoursite.com/wp-content/plugins/social-network-tabs/dcwp_twitter.php directly in browser or via curl. If page loads and contains Twitter API credentials, system is vulnerable.

Check Version:

wp plugin get social-network-tabs --field=version

Verify Fix Applied:

After update, attempt to access the dcwp_twitter.php file. It should return 404 error or empty response. Verify plugin version is 1.7.2+ in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /wp-content/plugins/social-network-tabs/dcwp_twitter.php
  • Unusual access patterns to plugin PHP files from external IPs

Network Indicators:

  • HTTP GET requests to dcwp_twitter.php from suspicious IPs
  • Subsequent connections to Twitter API from unexpected locations

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/social-network-tabs/dcwp_twitter.php" AND response="200"

🔗 References

📤 Share & Export