CVE-2023-51420

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution through improper input validation in Verge3D Publishing and E-Commerce WordPress plugin. Attackers can inject malicious code that gets executed on the server. All WordPress sites using affected versions of the Verge3D plugin are vulnerable.

💻 Affected Systems

Products:
  • Verge3D Publishing and E-Commerce WordPress Plugin
Versions: All versions up to and including 4.5.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Verge3D plugin active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to execute arbitrary code, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to website defacement, data theft, or installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for plugin-level compromise.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Internal systems using the plugin could be compromised through internal attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/verge3d/wordpress-verge3d-plugin-4-5-2-remote-code-execution-rce-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Update Verge3D Publishing and E-Commerce plugin to version 4.5.3 or later. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Verge3D plugin until patching is possible

wp plugin deactivate verge3d

Restrict Access

all

Use web application firewall to block requests to vulnerable plugin endpoints

🧯 If You Can't Patch

  • Immediately disable the Verge3D plugin via WordPress admin or command line
  • Implement strict network segmentation to isolate affected WordPress instances

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Verge3D Publishing and E-Commerce version number

Check Version:

wp plugin list --name=verge3d --field=version

Verify Fix Applied:

Verify plugin version is 4.5.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Verge3D plugin endpoints
  • Suspicious PHP execution in WordPress logs
  • Unexpected file creation in uploads directory

Network Indicators:

  • HTTP requests containing suspicious code patterns to /wp-content/plugins/verge3d/

SIEM Query:

source="wordpress.log" AND "verge3d" AND ("POST" OR "eval" OR "system" OR "exec")

🔗 References

📤 Share & Export