CVE-2022-0499

8.8 HIGH

📋 TL;DR

This vulnerability in the Sermon Browser WordPress plugin allows attackers to trick logged-in administrators into uploading malicious files like PHP scripts via CSRF attacks. It affects WordPress sites using vulnerable versions of the plugin. Attackers can achieve remote code execution if they successfully upload executable files.

💻 Affected Systems

Products:
  • Sermon Browser WordPress Plugin
Versions: through 0.45.22
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled and an administrator account that can be tricked into clicking malicious links.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise through remote code execution, allowing attackers to deface websites, steal data, install backdoors, or pivot to other systems.

🟠

Likely Case

Attackers upload web shells or malware to gain persistent access, potentially leading to data theft, credential harvesting, or cryptocurrency mining.

🟢

If Mitigated

With proper CSRF protection and file validation, the attack fails and administrators are protected from unauthorized file uploads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an admin into clicking a malicious link while authenticated. The technical complexity of the exploit itself is low.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.45.23 or later

Vendor Advisory: https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Sermon Browser plugin. 4. Click 'Update Now' if available, or manually update to version 0.45.23+. 5. Verify the plugin is updated to a patched version.

🔧 Temporary Workarounds

Disable Sermon Browser Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate sermon-browser

Implement Web Application Firewall Rules

all

Block requests to sermon file upload endpoints from unauthorized sources.

🧯 If You Can't Patch

  • Implement strict file upload validation at the web server level to block PHP and other executable file uploads.
  • Use security plugins that add CSRF protection to all WordPress forms and endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Sermon Browser version. If version is 0.45.22 or earlier, the system is vulnerable.

Check Version:

wp plugin get sermon-browser --field=version

Verify Fix Applied:

Verify the plugin version is 0.45.23 or later in the WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to sermon-related endpoints
  • PHP or executable files uploaded via POST requests to /wp-admin/admin-ajax.php with action=sermon_browser_upload

Network Indicators:

  • POST requests to sermon upload endpoints from unexpected sources
  • File uploads with suspicious extensions (.php, .phtml, .exe) to WordPress

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters.action="sermon_browser_upload")

🔗 References

📤 Share & Export