CVE-2021-24161

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to trick WordPress administrators into uploading malicious zip archives through the Responsive Menu plugin. Successful exploitation leads to remote code execution, affecting all WordPress sites using vulnerable versions of the Responsive Menu plugin (both free and Pro editions).

💻 Affected Systems

Products:
  • Responsive Menu WordPress Plugin (Free)
  • Responsive Menu WordPress Plugin (Pro)
Versions: All versions before 4.0.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator interaction (uploading a malicious zip file) but no special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise with attacker gaining full control over the WordPress installation, allowing data theft, defacement, malware distribution, and lateral movement to other systems.

🟠

Likely Case

Attacker uploads web shell or backdoor, establishes persistent access, and uses the compromised site for further attacks or data exfiltration.

🟢

If Mitigated

Attack fails due to administrator awareness, file upload restrictions, or security plugins blocking malicious uploads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an administrator into uploading a malicious zip file. Once uploaded, the PHP files can be accessed directly.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.4

Vendor Advisory: https://wordpress.org/plugins/responsive-menu/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Responsive Menu' and click 'Update Now'. 4. Alternatively, download version 4.0.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Responsive Menu plugin until patched

wp plugin deactivate responsive-menu

Restrict File Uploads

linux

Configure web server to block execution of PHP files in upload directories

Add 'php_flag engine off' to .htaccess in wp-content/uploads directory

🧯 If You Can't Patch

  • Remove administrator upload capabilities for non-trusted users
  • Implement web application firewall rules to block malicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Responsive Menu version. If version is below 4.0.4, you are vulnerable.

Check Version:

wp plugin get responsive-menu --field=version

Verify Fix Applied:

Confirm Responsive Menu plugin version is 4.0.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads via admin interface
  • Access to PHP files in upload directories with suspicious names

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with file upload parameters
  • Requests to PHP files in upload directories from unusual IPs

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" AND "action=upload_zip" OR "wp-content/uploads/*.php")

🔗 References

📤 Share & Export