CVE-2021-24252

7.2 HIGH

📋 TL;DR

The Event Banner WordPress plugin through version 1.3 has an unrestricted file upload vulnerability that allows authenticated admin users to upload arbitrary executable files like .php or .exe, leading to remote code execution. Due to missing CSRF protection, attackers can trick admins into uploading malicious files, and missing authorization checks could allow local file inclusion attacks. This affects all WordPress sites running the vulnerable plugin versions.

💻 Affected Systems

Products:
  • Event Banner WordPress Plugin
Versions: through 1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. Admin access needed for direct exploitation, but CSRF bypasses this requirement.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, allowing attackers to execute arbitrary commands, install backdoors, steal data, or pivot to other systems.

🟠

Likely Case

Attackers upload web shells or malware to gain persistent access, deface websites, or use the server for malicious activities like cryptocurrency mining or phishing.

🟢

If Mitigated

Limited impact with proper file upload restrictions, admin account security, and network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials or CSRF attack against admin user. Multiple attack vectors including file upload and LFI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4 or later

Vendor Advisory: https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c

Restart Required: No

Instructions:

1. Update Event Banner plugin to version 1.4 or later via WordPress admin dashboard. 2. Verify update completed successfully. 3. Test file upload functionality.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Event Banner plugin until patched

wp plugin deactivate event-banner

Restrict File Uploads

linux

Configure web server to block execution of uploaded files in upload directories

Add 'Options -ExecCGI' and 'RemoveHandler .php .php3 .php4 .php5 .php7 .phtml' to upload directory .htaccess

🧯 If You Can't Patch

  • Remove admin access from untrusted users and implement strict access controls
  • Implement web application firewall rules to block malicious file uploads and LFI attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin dashboard for Event Banner plugin version. If version is 1.3 or earlier, system is vulnerable.

Check Version:

wp plugin get event-banner --field=version

Verify Fix Applied:

Verify plugin version is 1.4 or later and test file upload functionality with non-image files (should be rejected).

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/uploads/event-banner/ with .php, .exe, or other executable extensions
  • Multiple failed upload attempts with suspicious file types
  • Admin user uploading files from unusual IP addresses

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with file upload parameters
  • HTTP requests to newly uploaded .php files in upload directories

SIEM Query:

source="web_server" AND (uri_path="/wp-admin/admin-ajax.php" AND method="POST" AND form_data CONTAINS "action=event_banner_upload") OR (uri_path CONTAINS "/wp-content/uploads/event-banner/" AND uri_path ENDS WITH ".php")

🔗 References

📤 Share & Export