CVE-2021-24472

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to make the web server fetch and display content from any URI via exposed proxy functionality in affected WordPress themes/plugins. It enables Server-Side Request Forgery (SSRF) and Remote File Inclusion (RFI) attacks. Users of OnAir2 WordPress theme before 3.9.9.2 or QT KenthaRadio WordPress plugin before 2.0.2 are affected.

💻 Affected Systems

Products:
  • OnAir2 WordPress theme
  • QT KenthaRadio WordPress plugin
Versions: OnAir2 theme before 3.9.9.2, QT KenthaRadio plugin before 2.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations using these vulnerable components. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via RFI leading to remote code execution, data exfiltration, or lateral movement to internal systems via SSRF.

🟠

Likely Case

Information disclosure from internal services, port scanning of internal networks, or limited file inclusion attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to the exposed proxy endpoint can trigger the vulnerability. Public exploit code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OnAir2 theme 3.9.9.2+, QT KenthaRadio plugin 2.0.2+

Vendor Advisory: https://wpscan.com/vulnerability/17591ac5-88fa-4cae-a61a-4dcf5dc0b72a

Restart Required: No

Instructions:

1. Update OnAir2 theme to version 3.9.9.2 or higher. 2. Update QT KenthaRadio plugin to version 2.0.2 or higher. 3. Verify updates are applied correctly.

🔧 Temporary Workarounds

Disable vulnerable components

linux

Temporarily disable the affected theme or plugin until patching is possible.

wp plugin deactivate qt-kentha-radio
wp theme disable onair2

WAF rule blocking

all

Block requests to the proxy endpoint using web application firewall rules.

🧯 If You Can't Patch

  • Implement strict network segmentation to limit server's outbound connections
  • Deploy web application firewall with SSRF and RFI protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for theme/plugin versions or use: wp theme list --fields=name,version and wp plugin list --fields=name,version

Check Version:

wp theme list --fields=name,version | grep onair2 && wp plugin list --fields=name,version | grep kentha

Verify Fix Applied:

Confirm theme version is 3.9.9.2+ and plugin version is 2.0.2+ using version check commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server
  • Requests to internal IP addresses or localhost from web application
  • Access to proxy-related endpoints without authentication

Network Indicators:

  • HTTP requests to unusual external domains from web server IP
  • Port scanning patterns originating from web server

SIEM Query:

source="web_server_logs" AND (uri CONTAINS "proxy" OR uri CONTAINS "fetch") AND response_code=200

🔗 References

📤 Share & Export