CVE-2021-24284

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary ZIP files containing malicious PHP scripts to WordPress sites using the Kaswara Modern VC Addons plugin. The plugin extracts these files without validation, enabling remote code execution. All WordPress installations with vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Kaswara Modern VC Addons WordPress plugin
Versions: through 3.0.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Kaswara plugin installed and active. No authentication required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via arbitrary PHP file upload leading to remote code execution, data theft, defacement, or ransomware deployment.

🟠

Likely Case

Website defacement, backdoor installation, credential theft, and lateral movement within the hosting environment.

🟢

If Mitigated

Limited impact if file uploads are blocked at web application firewall level or server permissions prevent PHP execution in uploads directory.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.2 or later

Vendor Advisory: https://codecanyon.net/item/kaswara-modern-visual-composer-addons/19341477

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Kaswara Modern VC Addons. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Block vulnerable AJAX endpoint

linux

Add .htaccess rule to block access to the vulnerable uploadFontIcon AJAX action

RewriteEngine On
RewriteCond %{QUERY_STRING} action=uploadFontIcon
RewriteRule ^ - [F]

Restrict PHP execution in uploads directory

all

Prevent PHP files from executing in the kaswara fonts directory

<Files *.php>
  deny from all
</Files>

🧯 If You Can't Patch

  • Immediately deactivate and remove the Kaswara Modern VC Addons plugin
  • Implement web application firewall rules to block file uploads to /wp-admin/admin-ajax.php with uploadFontIcon parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Kaswara Modern VC Addons version 3.0.1 or earlier

Check Version:

wp plugin list --name=kaswara --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 3.0.2 or later, or confirm plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=uploadFontIcon' parameter
  • File creation in wp-content/uploads/kaswara/fonts_icon/ with .php extension

Network Indicators:

  • Unusual file uploads to WordPress AJAX endpoints from unauthenticated sources

SIEM Query:

source="web_logs" AND uri_path="/wp-admin/admin-ajax.php" AND query_string="*action=uploadFontIcon*"

🔗 References

📤 Share & Export