CVE-2023-51468

10.0 CRITICAL

📋 TL;DR

CVE-2023-51468 is an unauthenticated arbitrary file upload vulnerability in the Rencontre WordPress dating site plugin. Attackers can upload malicious files without authentication, potentially leading to remote code execution. This affects all WordPress sites using Rencontre plugin versions up to 3.10.1.

💻 Affected Systems

Products:
  • Rencontre - Dating Site WordPress Plugin
Versions: n/a through 3.10.1
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via webshell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Website defacement, malware distribution, or credential theft via uploaded malicious scripts

🟢

If Mitigated

Limited impact if file execution is prevented via web server configuration or security controls

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.10.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-10-1-unauthenticated-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Rencontre plugin
4. Click 'Update Now' if available
5. If no update appears, manually download version 3.10.2+ from WordPress repository
6. Deactivate, delete old version, upload new version, activate

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Rencontre plugin until patched

wp plugin deactivate rencontre

Restrict Upload Directory

linux

Configure web server to prevent execution in upload directories

# Apache: Add to .htaccess in uploads directory
<FilesMatch "\.(php|php5|phtml|pl|py|jsp|asp|sh|cgi)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~* /wp-content/uploads/.*\.(php|php5|phtml|pl|py|jsp|asp|sh|cgi)$ {
  deny all;
}

🧯 If You Can't Patch

  • Disable the Rencontre plugin immediately
  • Implement web application firewall rules to block file upload requests to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Rencontre version. If version is 3.10.1 or earlier, you are vulnerable.

Check Version:

wp plugin get rencontre --field=version

Verify Fix Applied:

Confirm Rencontre plugin version is 3.10.2 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/plugins/rencontre/ directories
  • POST requests to rencontre upload endpoints from unauthenticated users
  • Execution of unexpected PHP files in upload directories

Network Indicators:

  • HTTP POST requests to paths containing 'rencontre' and file upload parameters
  • Unusual outbound connections from web server following uploads

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/rencontre/" AND method="POST" AND status=200)

🔗 References

📤 Share & Export