CVE-2023-4311

8.8 HIGH

📋 TL;DR

The Vrm 360 3D Model Viewer WordPress plugin through version 1.2.1 contains an arbitrary file upload vulnerability due to insufficient security checks in a plugin shortcode. This allows attackers to upload malicious files to vulnerable WordPress sites. All WordPress installations using affected plugin versions are at risk.

💻 Affected Systems

Products:
  • Vrm 360 3D Model Viewer WordPress Plugin
Versions: through 1.2.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with plugin enabled and shortcode usage.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to ransomware deployment, data exfiltration, or website defacement through remote code execution.

🟠

Likely Case

Backdoor installation for persistent access, credential theft, or malware distribution from compromised sites.

🟢

If Mitigated

Limited impact with proper file upload restrictions, web application firewalls, and file integrity monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of vulnerable shortcode but is straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.2 or later

Vendor Advisory: https://wpscan.com/vulnerability/21950116-1a69-4848-9da0-e912096c0fce

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Vrm 360 3D Model Viewer'. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation.

wp plugin deactivate vrm-360-3d-model-viewer

Restrict File Uploads

linux

Configure web server to block uploads of executable files via .htaccess or nginx rules.

# Add to .htaccess: <FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|phar|pl|py|jsp|asp|sh|cgi|exe)$">\n    Order Allow,Deny\n    Deny from all\n</FilesMatch>

🧯 If You Can't Patch

  • Remove plugin shortcodes from all posts/pages/widgets
  • Implement web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Vrm 360 3D Model Viewer version. If version is 1.2.1 or earlier, you are vulnerable.

Check Version:

wp plugin get vrm-360-3d-model-viewer --field=version

Verify Fix Applied:

Verify plugin version is 1.2.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads/vrm-360/ directory
  • POST requests to /wp-admin/admin-ajax.php with file upload parameters
  • Execution of unexpected PHP files in upload directories

Network Indicators:

  • HTTP POST requests with file uploads to WordPress admin endpoints
  • Unusual outbound connections from web server after file uploads

SIEM Query:

source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" AND method="POST" AND (form_data CONTAINS "action=vrm_360_upload" OR form_data CONTAINS "upload_file"))

🔗 References

📤 Share & Export