CVE-2021-39352

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers with administrative privileges in WordPress to upload malicious files through the Catch Themes Demo Import plugin's import functionality. It affects WordPress sites using vulnerable plugin versions, enabling remote code execution. Only authenticated administrators can exploit this flaw.

💻 Affected Systems

Products:
  • WordPress Catch Themes Demo Import plugin
Versions: Up to and including version 1.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have administrative privileges in WordPress.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through remote code execution, allowing data theft, malware deployment, or site takeover.

🟠

Likely Case

Unauthorized file upload leading to backdoor installation, data exfiltration, or privilege escalation.

🟢

If Mitigated

Limited impact if proper access controls and file validation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Multiple public exploit scripts available; requires admin access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.7.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2617555/catch-themes-demo-import/trunk/inc/CatchThemesDemoImport.php

Restart Required: No

Instructions:

1. Update WordPress Catch Themes Demo Import plugin to version 1.7.1 or later. 2. Verify update in WordPress admin panel. 3. No restart required.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate catch-themes-demo-import

Restrict admin access

all

Limit administrative privileges to trusted users only.

🧯 If You Can't Patch

  • Implement strict file upload validation at web server level.
  • Monitor for suspicious file uploads in WordPress uploads directory.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for plugin version; if version is 1.7 or earlier, it's vulnerable.

Check Version:

wp plugin list --name=catch-themes-demo-import --field=version

Verify Fix Applied:

Confirm plugin version is 1.7.1 or later in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via plugin import functionality
  • Suspicious POST requests to /wp-admin/admin.php?page=catch-themes-demo-import

Network Indicators:

  • Unexpected file uploads to WordPress admin endpoints
  • Traffic patterns matching known exploit scripts

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND query_string="page=catch-themes-demo-import") AND file_upload=true

🔗 References

📤 Share & Export