CVE-2023-51468
📋 TL;DR
CVE-2023-51468 is an unauthenticated arbitrary file upload vulnerability in the Rencontre WordPress dating site plugin. Attackers can upload malicious files without authentication, potentially leading to remote code execution. This affects all WordPress sites using Rencontre plugin versions up to 3.10.1.
💻 Affected Systems
- Rencontre - Dating Site WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via webshell upload leading to data theft, ransomware deployment, or use as attack platform
Likely Case
Website defacement, malware distribution, or credential theft via uploaded malicious scripts
If Mitigated
Limited impact if file execution is prevented via web server configuration or security controls
🎯 Exploit Status
Exploitation requires no authentication and minimal technical skill
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.10.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-10-1-unauthenticated-arbitrary-file-upload-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Rencontre plugin
4. Click 'Update Now' if available
5. If no update appears, manually download version 3.10.2+ from WordPress repository
6. Deactivate, delete old version, upload new version, activate
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the Rencontre plugin until patched
wp plugin deactivate rencontre
Restrict Upload Directory
linuxConfigure web server to prevent execution in upload directories
# Apache: Add to .htaccess in uploads directory
<FilesMatch "\.(php|php5|phtml|pl|py|jsp|asp|sh|cgi)$">
Order Allow,Deny
Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~* /wp-content/uploads/.*\.(php|php5|phtml|pl|py|jsp|asp|sh|cgi)$ {
deny all;
}
🧯 If You Can't Patch
- Disable the Rencontre plugin immediately
- Implement web application firewall rules to block file upload requests to vulnerable endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Rencontre version. If version is 3.10.1 or earlier, you are vulnerable.
Check Version:
wp plugin get rencontre --field=version
Verify Fix Applied:
Confirm Rencontre plugin version is 3.10.2 or later in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/rencontre/ directories
- POST requests to rencontre upload endpoints from unauthenticated users
- Execution of unexpected PHP files in upload directories
Network Indicators:
- HTTP POST requests to paths containing 'rencontre' and file upload parameters
- Unusual outbound connections from web server following uploads
SIEM Query:
source="web_server_logs" AND (uri_path="/wp-content/plugins/rencontre/" AND method="POST" AND status=200)
🔗 References
- https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-10-1-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-10-1-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve