CVE-2023-31215
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites running the Dropshipping & Affiliation with Amazon plugin. Attackers can upload malicious files like PHP shells, leading to remote code execution. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- Dropshipping & Affiliation with Amazon WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise - attackers gain full control of the WordPress site and potentially the underlying server, allowing data theft, defacement, or use as a foothold for lateral movement.
Likely Case
Website defacement, malware injection, or backdoor installation leading to persistent unauthorized access and potential data exfiltration.
If Mitigated
Limited impact if file uploads are restricted by web application firewall or server-side controls, though the vulnerability remains exploitable.
🎯 Exploit Status
File upload vulnerabilities are commonly exploited with simple HTTP requests. Public exploit details are available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Dropshipping & Affiliation with Amazon'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.1.3+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable plugin
allTemporarily deactivate the vulnerable plugin until patched
Web Application Firewall rule
allBlock file upload requests to the plugin's upload endpoint
Example WAF rule: Block requests where URI contains '/wp-content/plugins/wp-amazon-shop/' AND contains file upload parameters
🧯 If You Can't Patch
- Remove the plugin completely if not essential for business operations
- Implement strict file upload restrictions at server level (e.g., .htaccess rules blocking PHP execution in upload directories)
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Dropshipping & Affiliation with Amazon → Version. If version is 2.1.2 or lower, you are vulnerable.
Check Version:
wp plugin list --name='Dropshipping & Affiliation with Amazon' --field=version (WP-CLI) OR check wp-content/plugins/wp-amazon-shop/readme.txt
Verify Fix Applied:
Confirm plugin version is 2.1.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to plugin upload endpoints with suspicious file extensions (.php, .phtml, .php5)
- Files with unusual names appearing in wp-content/uploads/ or plugin directories
Network Indicators:
- Unusual outbound connections from WordPress server after file uploads
- HTTP requests with file upload parameters to plugin-specific URLs
SIEM Query:
source="web_logs" AND (uri="/wp-content/plugins/wp-amazon-shop/*" AND method="POST" AND (file_extension="php" OR file_extension="phtml"))
🔗 References
- https://patchstack.com/database/vulnerability/wp-amazon-shop/wordpress-dropshipping-affiliation-with-amazon-plugin-2-1-2-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/wp-amazon-shop/wordpress-dropshipping-affiliation-with-amazon-plugin-2-1-2-arbitrary-file-upload-vulnerability?_s_id=cve