CVE-2023-23888

7.6 HIGH

📋 TL;DR

This path traversal vulnerability in Rank Math SEO WordPress plugin allows attackers to read arbitrary files on the server by manipulating file paths. It affects all WordPress sites running Rank Math SEO versions up to 1.0.107.2. Attackers can potentially access sensitive configuration files and other restricted data.

💻 Affected Systems

Products:
  • Rank Math SEO WordPress Plugin
Versions: n/a through 1.0.107.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like wp-config.php containing database credentials, leading to database takeover, site defacement, or malware installation.

🟠

Likely Case

Unauthorized access to sensitive server files including configuration files, logs, and potentially user data, enabling reconnaissance for further attacks.

🟢

If Mitigated

Limited impact if proper file permissions restrict access to critical files and web server runs with minimal privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are typically easy to exploit with publicly available techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.107.3 and later

Vendor Advisory: https://patchstack.com/database/vulnerability/seo-by-rank-math/wordpress-rank-math-seo-plugin-1-0-107-2-local-file-inclusion-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Rank Math SEO and click 'Update Now'. 4. Verify version is 1.0.107.3 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate Rank Math SEO plugin until patched

Web Application Firewall rule

all

Block path traversal patterns in requests

🧯 If You Can't Patch

  • Implement strict file permissions (chmod 600 for sensitive files)
  • Deploy web application firewall with path traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Rank Math SEO version

Check Version:

wp plugin list --name=seo-by-rank-math --field=version

Verify Fix Applied:

Confirm plugin version is 1.0.107.3 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with ../ sequences
  • Access to unusual file paths in web logs
  • Failed attempts to access wp-config.php

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\, %2e%2e%2f)

SIEM Query:

web_access_logs WHERE url CONTAINS '../' OR url CONTAINS '..\' OR url CONTAINS '%2e%2e%2f'

🔗 References

📤 Share & Export