CVE-2023-47784
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites using vulnerable versions of the Slider Revolution plugin. Attackers can exploit this to upload malicious files like webshells, potentially gaining unauthorized access or control. All WordPress sites with Slider Revolution versions up to 6.6.15 are affected.
💻 Affected Systems
- ThemePunch OHG Slider Revolution WordPress Plugin
📦 What is this software?
Slider Revolution by Themepunch
⚠️ Risk & Real-World Impact
Worst Case
Complete site compromise through remote code execution, data theft, defacement, or malware distribution.
Likely Case
Unauthorized file upload leading to webshell installation, backdoor persistence, or limited server access.
If Mitigated
File upload attempts blocked or logged with no successful exploitation.
🎯 Exploit Status
Exploitation requires at least author-level access; public proof-of-concept code exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.6.16 or later
Vendor Advisory: https://www.sliderrevolution.com/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Slider Revolution. 4. Click 'Update Now' or manually update to version 6.6.16+. 5. Verify update completes successfully.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate Slider Revolution plugin until patched.
wp plugin deactivate revslider
Restrict File Uploads
allUse web application firewall (WAF) rules to block suspicious file uploads to Slider Revolution endpoints.
🧯 If You Can't Patch
- Implement strict file upload validation at the web server or application level.
- Monitor and audit file upload activities, especially to Slider Revolution directories.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Slider Revolution version; if ≤6.6.15, vulnerable.
Check Version:
wp plugin get revslider --field=version
Verify Fix Applied:
Confirm Slider Revolution version is 6.6.16 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/revslider/ directories
- POST requests to revslider_admin_ajax.php with file parameters
Network Indicators:
- HTTP POST requests with file uploads to Slider Revolution admin endpoints
SIEM Query:
source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND action="revslider_ajax_action" AND (file_upload OR filename)
🔗 References
- https://patchstack.com/database/vulnerability/revslider/wordpress-slider-revolution-plugin-6-6-15-author-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/revslider/wordpress-slider-revolution-plugin-6-6-15-author-arbitrary-file-upload-vulnerability?_s_id=cve