CVE-2020-10257

9.8 CRITICAL

📋 TL;DR

CVE-2020-10257 is a critical remote code execution vulnerability in the ThemeREX Addons WordPress plugin. It allows unauthenticated attackers to execute arbitrary PHP code via an unsafe parameter in the REST API endpoint. All WordPress sites using vulnerable versions of the plugin are affected.

💻 Affected Systems

Products:
  • ThemeREX Addons WordPress Plugin
Versions: All versions before 2020-03-09
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the ThemeREX Addons plugin enabled. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.

🟠

Likely Case

Website defacement, malware injection, data theft, or cryptocurrency mining malware installation.

🟢

If Mitigated

No impact if the vulnerable endpoint is properly restricted or the plugin is updated/disabled.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on publicly accessible WordPress sites.
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be exploited by internal attackers or through compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial with publicly available proof-of-concept code. The vulnerability was actively exploited in the wild before patching.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2020-03-09 or later

Vendor Advisory: https://themerex.net/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ThemeREX Addons plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable REST endpoint

all

Add code to functions.php to block access to the vulnerable endpoint

add_filter('rest_endpoints', function($endpoints) { if (isset($endpoints['/trx_addons/v2/get/sc_layout'])) { unset($endpoints['/trx_addons/v2/get/sc_layout']); } return $endpoints; });

Disable plugin

all

Temporarily disable ThemeREX Addons plugin until patched

Navigate to WordPress admin → Plugins → Installed Plugins → Deactivate ThemeREX Addons

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to /trx_addons/v2/get/sc_layout endpoint
  • Restrict access to WordPress admin and REST API endpoints using IP whitelisting or authentication

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → ThemeREX Addons → Version. If version date is before 2020-03-09, you are vulnerable.

Check Version:

wp plugin list --name=trx-addons --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 2020-03-09 or later. Test endpoint access with curl: curl -X POST https://yoursite.com/wp-json/trx_addons/v2/get/sc_layout -d '{"sc":"phpinfo()"}' should return error or no PHP execution.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-json/trx_addons/v2/get/sc_layout
  • Unusual PHP execution errors in web server logs
  • Suspicious user agents or IPs accessing REST endpoints

Network Indicators:

  • POST requests to /trx_addons/v2/get/sc_layout with PHP code in parameters
  • Unusual outbound connections from web server after exploitation

SIEM Query:

source="web_logs" AND (url_path="/wp-json/trx_addons/v2/get/sc_layout" OR url_path="/?rest_route=/trx_addons/v2/get/sc_layout")

🔗 References

📤 Share & Export