CVE-2020-28035
📋 TL;DR
CVE-2020-28035 is a privilege escalation vulnerability in WordPress that allows attackers to gain administrative access via XML-RPC. This affects WordPress installations before version 5.5.2. Any WordPress site with XML-RPC enabled is vulnerable to attackers taking full control.
💻 Affected Systems
- WordPress
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Wordpress by Wordpress
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control over the WordPress site, allowing them to deface content, install backdoors, steal data, or use the site for further attacks.
Likely Case
Attackers escalate privileges to administrator level, enabling them to modify content, install malicious plugins/themes, or create new admin accounts.
If Mitigated
With proper controls like disabling XML-RPC or implementing strong access controls, impact is limited to potential denial of service or information disclosure.
🎯 Exploit Status
Exploitation requires some level of access (typically subscriber or higher) to trigger the privilege escalation via XML-RPC. The vulnerability is in the XML-RPC authentication mechanism.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: WordPress 5.5.2 and later
Vendor Advisory: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
Restart Required: No
Instructions:
1. Backup your WordPress site and database. 2. Update WordPress to version 5.5.2 or later via the WordPress admin dashboard (Dashboard → Updates). 3. Verify the update completed successfully. 4. Clear any caching plugins or CDN caches.
🔧 Temporary Workarounds
Disable XML-RPC
allCompletely disable XML-RPC functionality if not needed for your site operations
Add to .htaccess: <Files xmlrpc.php> order deny,allow deny from all </Files>
Add to functions.php: add_filter('xmlrpc_enabled', '__return_false');
Restrict XML-RPC Access
linuxLimit XML-RPC access to specific IP addresses if needed for functionality
Add to .htaccess: <Files xmlrpc.php> order deny,allow deny from all allow from 192.168.1.0/24 </Files>
🧯 If You Can't Patch
- Disable XML-RPC completely using .htaccess or plugin methods
- Implement strict network access controls to limit XML-RPC exposure
🔍 How to Verify
Check if Vulnerable:
Check WordPress version in admin dashboard or via wp-includes/version.php. If version is below 5.5.2, the site is vulnerable.
Check Version:
grep '\$wp_version' wp-includes/version.php
Verify Fix Applied:
Verify WordPress version is 5.5.2 or higher. Test XML-RPC functionality if required for your site.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed XML-RPC authentication attempts
- Successful XML-RPC login from unusual IP addresses
- User privilege changes via XML-RPC
Network Indicators:
- XML-RPC POST requests to /xmlrpc.php with authentication attempts
- Unusual XML-RPC traffic patterns
SIEM Query:
source="web_server" AND (uri_path="/xmlrpc.php" OR method="POST" AND user_agent="WordPress/*")
🔗 References
- https://lists.debian.org/debian-lts-announce/2020/11/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHVNK2WYAM3ZTCXTFSEIT56IKLVJHU3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VAVVYJKA2I6CRQUINECDPBGWMQDEG244/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUXVUAKL2HL4QYJEPHBNVQQWRMFMII2Y/
- https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
- https://www.debian.org/security/2020/dsa-4784
- https://lists.debian.org/debian-lts-announce/2020/11/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHVNK2WYAM3ZTCXTFSEIT56IKLVJHU3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VAVVYJKA2I6CRQUINECDPBGWMQDEG244/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUXVUAKL2HL4QYJEPHBNVQQWRMFMII2Y/
- https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
- https://www.debian.org/security/2020/dsa-4784