CVE-2020-36708

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary PHP functions via the epsilon_framework_ajax_action in vulnerable WordPress themes, leading to remote code execution. It affects multiple WordPress themes using the Epsilon Framework. Anyone running affected theme versions is vulnerable.

💻 Affected Systems

Products:
  • Shapely
  • NewsMag
  • Activello
  • Illdy
  • Allegiant
  • Newspaper X
  • Pixova Lite
  • Brilliance
  • MedZone Lite
  • Regina Lite
  • Transcend
  • Affluent
  • Bonkers
  • Antreas
  • Sparkling
  • NatureMag Lite
Versions: Up to and including Shapely 1.2.7, NewsMag 2.4.1, Activello 1.4.0, Illdy 2.1.4, Allegiant 1.2.2, Newspaper X 1.3.1, Pixova Lite 2.0.5, Brilliance 1.2.7, MedZone Lite 1.2.4, Regina Lite 2.0.4, Transcend 1.1.8, Affluent 1.1.0, Bonkers 1.0.4, Antreas 1.0.2, Sparkling 2.4.8, NatureMag Lite 1.0.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using affected theme versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the WordPress site, installing backdoors, stealing data, and using the server for further attacks.

🟠

Likely Case

Website defacement, malware injection, credential theft, and use as part of botnets or for cryptocurrency mining.

🟢

If Mitigated

Limited impact if proper web application firewalls, file integrity monitoring, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploits are publicly available and have been used in large-scale attacks. Attack requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest versions of each theme (check individual theme changelogs)

Vendor Advisory: https://wpscan.com/vulnerability/bec52a5b-c892-4763-a962-05da7100eca5

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for updates on affected themes. 4. Update all vulnerable themes to latest versions. 5. Verify updates completed successfully.

🔧 Temporary Workarounds

Disable vulnerable themes

all

Switch to a non-vulnerable theme until patches can be applied

wp theme activate twentytwentyone
wp theme delete [vulnerable-theme-name]

Web Application Firewall rule

linux

Block requests to epsilon_framework_ajax_action endpoint

LocationMatch "\/wp-admin\/admin-ajax\.php"
SetEnvIf Request_URI "epsilon_framework_ajax_action" block_epsilon
Deny from env=block_epsilon

🧯 If You Can't Patch

  • Implement strict web application firewall rules blocking suspicious PHP function calls
  • Enable file integrity monitoring to detect unauthorized file changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme versions in Appearance > Themes or use: wp theme list --fields=name,status,version

Check Version:

wp theme list --fields=name,version

Verify Fix Applied:

Verify theme versions are above vulnerable ranges and test admin-ajax.php endpoint for epsilon_framework_ajax_action

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with epsilon_framework_ajax_action parameter
  • Unusual PHP function calls in web server logs
  • File creation/modification in wp-content directory

Network Indicators:

  • HTTP POST requests containing eval(), system(), exec() or similar functions in parameters
  • Traffic patterns matching known exploit payloads

SIEM Query:

source="web_logs" AND uri_path="/wp-admin/admin-ajax.php" AND (param="epsilon_framework_ajax_action" OR param CONTAINS "eval" OR param CONTAINS "system")

🔗 References

📤 Share & Export