CVE-2021-24638
📋 TL;DR
The OMGF WordPress plugin before version 4.5.4 has an unauthenticated path traversal vulnerability in its REST API. This allows attackers to overwrite arbitrary CSS files with Google Fonts CSS or download fonts from Google Fonts. All WordPress sites running vulnerable OMGF plugin versions are affected.
💻 Affected Systems
- OMGF WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete website defacement, injection of malicious CSS leading to credential theft via phishing, or denial of service by overwriting critical CSS files.
Likely Case
Website defacement through CSS injection, potential SEO damage, and disruption of site appearance.
If Mitigated
Minimal impact if proper file permissions and web application firewalls are in place.
🎯 Exploit Status
Exploitation requires no authentication and uses simple HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.4
Vendor Advisory: https://wordpress.org/plugins/omgf/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find OMGF plugin. 4. Click 'Update Now' if available, or download version 4.5.4+ from WordPress repository. 5. Activate updated plugin.
🔧 Temporary Workarounds
Disable OMGF Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate omgf
Restrict REST API Access
allBlock unauthenticated access to WordPress REST API endpoints.
🧯 If You Can't Patch
- Implement web application firewall rules to block path traversal attempts.
- Set strict file permissions on CSS directories (644 for files, 755 for directories).
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > OMGF version. If version is below 4.5.4, system is vulnerable.
Check Version:
wp plugin get omgf --field=version
Verify Fix Applied:
Confirm OMGF plugin version is 4.5.4 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-json/omgf/v1/ with suspicious handle parameters containing '../' sequences
- Unusual file modifications in wp-content/uploads/omgf directory
Network Indicators:
- POST requests to OMGF REST API endpoints from unauthenticated sources
SIEM Query:
source="wordpress.log" AND uri_path="/wp-json/omgf/v1/" AND (param_handle="*../*" OR status_code=200)