CVE-2021-4457

9.1 CRITICAL

📋 TL;DR

The ZoomSounds WordPress plugin before version 6.05 contains an unrestricted file upload vulnerability. Unauthenticated attackers can upload arbitrary files to the web server, potentially leading to remote code execution. This affects all WordPress sites running vulnerable versions of the ZoomSounds plugin.

💻 Affected Systems

Products:
  • ZoomSounds WordPress Plugin
Versions: All versions before 6.05
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, ransomware deployment, or website defacement.

🟠

Likely Case

Webshell upload allowing persistent backdoor access, file manipulation, or privilege escalation.

🟢

If Mitigated

File upload attempts blocked or logged, with no successful exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet without authentication.
🏢 Internal Only: LOW - Same exploit path but requires internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to vulnerable endpoint with file upload payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.05 and later

Vendor Advisory: https://wpscan.com/vulnerability/07259a61-8ba9-4dd0-8d52-cc1df389c0ad

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ZoomSounds plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete plugin.

🔧 Temporary Workarounds

Block vulnerable endpoint via .htaccess

all

Prevent access to the vulnerable PHP file using web server rules.

# Add to .htaccess in WordPress root directory
<Files "zoomSounds-master/zoomSounds-master/zoom-admin/upload.php">
    Order Allow,Deny
    Deny from all
</Files>

Web Application Firewall rule

all

Block requests to the vulnerable upload endpoint.

# Example WAF rule to block requests to upload.php
# Block: /wp-content/plugins/zoomSounds-master/zoomSounds-master/zoom-admin/upload.php

🧯 If You Can't Patch

  • Immediately deactivate and remove the ZoomSounds plugin from all WordPress installations.
  • Implement strict file upload validation and monitoring on web servers.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for ZoomSounds version. If version is below 6.05, system is vulnerable.

Check Version:

# Check via WordPress CLI
wp plugin list --name=zoomsounds --field=version

# Or check file directly
cat /path/to/wp-content/plugins/zoomSounds-master/zoomSounds-master/zoom-admin/upload.php | grep -i version

Verify Fix Applied:

Confirm ZoomSounds plugin version is 6.05 or higher, or verify plugin is completely removed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/zoomSounds-master/zoomSounds-master/zoom-admin/upload.php
  • File uploads to unexpected locations
  • Webshell creation in upload directories

Network Indicators:

  • Unusual outbound connections from web server
  • POST requests to upload.php from external IPs

SIEM Query:

source="web_server_logs" AND (uri="/wp-content/plugins/zoomSounds-master/zoomSounds-master/zoom-admin/upload.php" OR file_upload="*.php")

🔗 References

📤 Share & Export