CVE-2020-36849
📋 TL;DR
The AIT CSV import/export WordPress plugin allows unauthenticated attackers to upload arbitrary files due to missing file type validation. This vulnerability affects WordPress sites using plugin versions up to 3.0.3 and can lead to remote code execution.
💻 Affected Systems
- AIT CSV Import/Export WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, allowing attackers to install backdoors, steal data, or pivot to other systems.
Likely Case
Webshell upload leading to data theft, defacement, or cryptocurrency mining malware installation.
If Mitigated
File upload attempts blocked or logged with no successful exploitation.
🎯 Exploit Status
Metasploit module available, simple HTTP POST request exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.4 or later
Vendor Advisory: https://www.ait-themes.club/wordpress-plugins/csv-import-export/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'AIT CSV Import/Export' and update to latest version. 4. Verify update completed successfully.
🔧 Temporary Workarounds
Disable vulnerable endpoint
allBlock access to the vulnerable upload-handler.php file via web server configuration
# For Apache: add to .htaccess
<Files "upload-handler.php">
Order Allow,Deny
Deny from all
</Files>
# For Nginx: add to server block
location ~ /wp-content/plugins/ait-csv-import-export/admin/upload-handler\.php$ {
deny all;
return 403;
}
Disable plugin
linuxTemporarily deactivate the vulnerable plugin until patched
wp plugin deactivate ait-csv-import-export
🧯 If You Can't Patch
- Remove the plugin entirely from the WordPress installation
- Implement strict file upload filtering at the web application firewall level
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for 'AIT CSV Import/Export' version 3.0.3 or earlier
Check Version:
wp plugin list --name=ait-csv-import-export --field=version
Verify Fix Applied:
Confirm plugin version is 3.0.4 or later in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-content/plugins/ait-csv-import-export/admin/upload-handler.php
- Uploads of non-CSV files (e.g., .php, .exe) to plugin directory
Network Indicators:
- Unusual outbound connections from web server following file uploads
- HTTP requests with suspicious file extensions in POST data
SIEM Query:
source="web_server_logs" AND uri="*upload-handler.php" AND method="POST" AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")
🔗 References
- https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/wp_ait_csv_rce.rb
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_ait_csv_rce.rb
- https://wpscan.com/vulnerability/36e699a4-91f2-426d-ba14-26036fbfeaea
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-ait-themes-csv-import-export-arbitrary-file-upload-3-0-3/
- https://www.ait-themes.club/wordpress-plugins/csv-import-export/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cece751c-400d-42b4-9438-950d5aca51fc?source=cve
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/wp_ait_csv_rce.rb