CVE-2020-36333

9.1 CRITICAL

📋 TL;DR

CVE-2020-36333 is an authentication bypass vulnerability in the themegrill-demo-importer WordPress plugin that allows unauthenticated attackers to wipe the entire WordPress database. This affects all WordPress sites running vulnerable versions of the plugin, potentially leading to complete data loss and site destruction.

💻 Affected Systems

Products:
  • WordPress themegrill-demo-importer plugin
Versions: All versions before 1.6.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database wipe leading to total data loss, site destruction, and potential business disruption.

🟠

Likely Case

Malicious actors wiping databases for vandalism or extortion, causing significant downtime and data recovery costs.

🟢

If Mitigated

No impact if proper authentication controls are in place or plugin is updated/disabled.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers.
🏢 Internal Only: LOW - The vulnerability requires web access, so internal-only systems are less exposed unless compromised internally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to the vulnerable endpoint can trigger database wipe without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.2

Vendor Advisory: https://wordpress.org/plugins/themegrill-demo-importer/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ThemeGrill Demo Importer'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.6.2+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable the plugin

all

Deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate themegrill-demo-importer

Block vulnerable endpoint

linux

Use web application firewall or .htaccess to block access to the reset endpoint

# Add to .htaccess:
RewriteCond %{REQUEST_URI} reset_wizard_actions
RewriteRule ^ - [F]

🧯 If You Can't Patch

  • Immediately disable the themegrill-demo-importer plugin
  • Implement strict network access controls and web application firewall rules to block unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'ThemeGrill Demo Importer' version. If version is below 1.6.2, you are vulnerable.

Check Version:

wp plugin get themegrill-demo-importer --field=version

Verify Fix Applied:

Verify plugin version is 1.6.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=reset_wizard_actions
  • Database wipe/truncate operations from web user
  • Sudden increase in database error logs

Network Indicators:

  • POST requests to admin-ajax.php with reset_wizard_actions parameter from unauthenticated sources

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND params.action="reset_wizard_actions" AND user="-"

🔗 References

📤 Share & Export