CVE-2023-23888
📋 TL;DR
This path traversal vulnerability in Rank Math SEO WordPress plugin allows attackers to read arbitrary files on the server by manipulating file paths. It affects all WordPress sites running Rank Math SEO versions up to 1.0.107.2. Attackers can potentially access sensitive configuration files and other restricted data.
💻 Affected Systems
- Rank Math SEO WordPress Plugin
📦 What is this software?
Seo by Rankmath
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through reading sensitive files like wp-config.php containing database credentials, leading to database takeover, site defacement, or malware installation.
Likely Case
Unauthorized access to sensitive server files including configuration files, logs, and potentially user data, enabling reconnaissance for further attacks.
If Mitigated
Limited impact if proper file permissions restrict access to critical files and web server runs with minimal privileges.
🎯 Exploit Status
Path traversal vulnerabilities are typically easy to exploit with publicly available techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.107.3 and later
Vendor Advisory: https://patchstack.com/database/vulnerability/seo-by-rank-math/wordpress-rank-math-seo-plugin-1-0-107-2-local-file-inclusion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Rank Math SEO and click 'Update Now'. 4. Verify version is 1.0.107.3 or higher.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate Rank Math SEO plugin until patched
Web Application Firewall rule
allBlock path traversal patterns in requests
🧯 If You Can't Patch
- Implement strict file permissions (chmod 600 for sensitive files)
- Deploy web application firewall with path traversal detection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins → Rank Math SEO version
Check Version:
wp plugin list --name=seo-by-rank-math --field=version
Verify Fix Applied:
Confirm plugin version is 1.0.107.3 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with ../ sequences
- Access to unusual file paths in web logs
- Failed attempts to access wp-config.php
Network Indicators:
- HTTP requests containing path traversal sequences (../, ..\, %2e%2e%2f)
SIEM Query:
web_access_logs WHERE url CONTAINS '../' OR url CONTAINS '..\' OR url CONTAINS '%2e%2e%2f'