CVE-2022-29451

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to trick logged-in WordPress administrators into uploading malicious files via Cross-Site Request Forgery (CSRF). Attackers can upload dangerous files to the /wp-content/uploads/ directory, potentially leading to remote code execution. Only WordPress sites using the vulnerable Rara One Click Demo Import plugin are affected.

💻 Affected Systems

Products:
  • WordPress Rara One Click Demo Import plugin
Versions: <= 1.2.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress admin user to be logged in and tricked into visiting malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise through remote code execution, data theft, defacement, or malware distribution via uploaded malicious files.

🟠

Likely Case

Unauthorized file upload leading to backdoor installation, defacement, or limited data exposure.

🟢

If Mitigated

No impact if proper CSRF protections are in place or plugin is updated/disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick admin, but technical complexity is low once admin is compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.0

Vendor Advisory: https://wordpress.org/plugins/rara-one-click-demo-import/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Rara One Click Demo Import'. 4. Click 'Update Now' if available, or manually update to version 1.3.0+. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched

wp plugin deactivate rara-one-click-demo-import

Add CSRF protection

all

Implement WordPress nonce verification for file upload endpoints

🧯 If You Can't Patch

  • Remove plugin entirely if not needed
  • Implement web application firewall rules to block suspicious file uploads

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin get rara-one-click-demo-import --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.0 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file uploads to /wp-content/uploads/
  • CSRF attempts against plugin endpoints
  • Suspicious admin activity from unexpected sources

Network Indicators:

  • POST requests to plugin file upload endpoints without proper referrer/nonce
  • Unexpected file types (.php, .exe) uploaded to uploads directory

SIEM Query:

source="wordpress.log" AND ("rara-one-click-demo-import" OR "demo-import") AND ("upload" OR "import")

🔗 References

📤 Share & Export