CVE-2022-1008

7.2 HIGH

📋 TL;DR

This vulnerability allows WordPress administrators to upload arbitrary files, including PHP scripts, through the One Click Demo Import plugin. It bypasses WordPress security settings that normally restrict file modifications and editing. Only sites using vulnerable plugin versions with admin users are affected.

💻 Affected Systems

Products:
  • WordPress One Click Demo Import plugin
Versions: All versions before 3.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress admin privileges; FILE_MODS and FILE_EDIT WordPress constants being false does not prevent exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise via remote code execution, allowing attackers to create backdoors, steal data, deface websites, or install malware.

🟠

Likely Case

Administrators accidentally or maliciously uploading malicious files leading to backdoor installation or site defacement.

🟢

If Mitigated

Limited impact if strict file permissions and admin user vetting are in place, though risk remains for authorized admins.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials; public proof-of-concept exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2695999

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'One Click Demo Import'. 4. Click 'Update Now' if available, or manually update to version 3.1.0+. 5. Verify plugin version shows 3.1.0 or higher.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the One Click Demo Import plugin until patched.

wp plugin deactivate one-click-demo-import

Restrict admin access

all

Limit WordPress admin accounts to trusted users only and implement multi-factor authentication.

🧯 If You Can't Patch

  • Remove admin privileges from untrusted users and implement principle of least privilege.
  • Implement web application firewall rules to block file uploads with PHP extensions via the plugin.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → One Click Demo Import → Version. If version is below 3.1.0, system is vulnerable.

Check Version:

wp plugin get one-click-demo-import --field=version

Verify Fix Applied:

Confirm plugin version is 3.1.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • WordPress logs showing file uploads via the One Click Demo Import plugin, especially PHP files.
  • Web server logs with POST requests to /wp-admin/admin.php?page=pt-one-click-demo-import with file upload parameters.

Network Indicators:

  • HTTP POST requests containing multipart/form-data with file uploads to the plugin's admin endpoint.

SIEM Query:

source="wordpress.log" AND "pt-one-click-demo-import" AND "upload"

🔗 References

📤 Share & Export