CVE-2022-0440

7.2 HIGH

📋 TL;DR

This vulnerability in the Catch Themes Demo Import WordPress plugin allows high-privilege administrators to upload arbitrary PHP files, leading to remote code execution. It affects WordPress sites using vulnerable plugin versions, even those with security hardening constants enabled. Only administrators can exploit this vulnerability.

💻 Affected Systems

Products:
  • Catch Themes Demo Import WordPress Plugin
Versions: All versions before 2.1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable even with WordPress hardening constants DISALLOW_UNFILTERED_HTML, DISALLOW_FILE_EDIT, and DISALLOW_FILE_MODS set to true.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise with attacker gaining full control over the WordPress installation and potentially the underlying server through arbitrary PHP file upload and execution.

🟠

Likely Case

Administrator account compromise leading to website defacement, data theft, or installation of backdoors and malware.

🟢

If Mitigated

Limited impact if proper access controls restrict administrator accounts and file uploads are monitored, though RCE potential remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator privileges. Public proof-of-concept exists via WPScan references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1

Vendor Advisory: https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Catch Themes Demo Import' plugin. 4. Update to version 2.1.1 or later. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Catch Themes Demo Import plugin until patched.

wp plugin deactivate catch-themes-demo-import

Restrict administrator access

all

Implement strict access controls and monitoring for administrator accounts.

🧯 If You Can't Patch

  • Remove administrator privileges from untrusted users
  • Implement web application firewall rules to block PHP file uploads through the plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Catch Themes Demo Import' version lower than 2.1.1.

Check Version:

wp plugin get catch-themes-demo-import --field=version

Verify Fix Applied:

Confirm plugin version is 2.1.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP file uploads via plugin endpoints
  • Administrator account performing unexpected import operations

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with demo import actions
  • Unexpected file uploads with .php extensions

SIEM Query:

source="wordpress.log" AND "catch-themes-demo-import" AND "import" AND ".php"

🔗 References

📤 Share & Export