CVE-2023-6559

7.5 HIGH

📋 TL;DR

The MW WP Form WordPress plugin has a vulnerability allowing unauthenticated attackers to delete arbitrary files on the server, including critical WordPress files like wp-config.php. This affects all versions up to 5.0.3. Successful exploitation could lead to complete site takeover and remote code execution.

💻 Affected Systems

Products:
  • MW WP Form WordPress Plugin
Versions: All versions up to and including 5.0.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise via wp-config.php deletion leading to database takeover, followed by remote code execution and potential server compromise.

🟠

Likely Case

Site defacement, data loss from deleted files, and service disruption requiring restoration from backups.

🟢

If Mitigated

Limited impact with proper file permissions and monitoring, potentially only non-critical file deletion.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows any internet user to attack vulnerable sites.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but unauthenticated nature makes internet-facing risk higher.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal attack with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.4

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3007879/mw-wp-form

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find MW WP Form and click 'Update Now'. 4. Verify version is 5.0.4 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate mw-wp-form

File Permission Hardening

linux

Set restrictive permissions on critical WordPress files.

chmod 400 wp-config.php
chmod 400 wp-config-sample.php

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal attempts
  • Disable file upload functionality in the plugin settings if possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → MW WP Form version. If version ≤5.0.3, vulnerable.

Check Version:

wp plugin get mw-wp-form --field=version

Verify Fix Applied:

Verify plugin version is 5.0.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/mw-wp-form/ with path traversal patterns
  • File deletion events in wp-content/uploads/mw-wp-form/ directory

Network Indicators:

  • POST requests containing '../' sequences to MW WP Form endpoints

SIEM Query:

source="web_logs" AND uri="/wp-content/plugins/mw-wp-form/*" AND (payload="../" OR payload="..\\")

🔗 References

📤 Share & Export