CVE-2023-6635
📋 TL;DR
The EditorsKit WordPress plugin has an arbitrary file upload vulnerability in versions up to 1.40.3. Authenticated attackers with administrator privileges can upload malicious files to the server, potentially leading to remote code execution. This affects WordPress sites using the vulnerable plugin version.
💻 Affected Systems
- WordPress EditorsKit plugin (also called Block Options)
📦 What is this software?
Editorskit by Extendify
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or pivot to internal networks.
Likely Case
Website defacement, malware injection, data theft, or creation of persistent backdoors for future attacks.
If Mitigated
Limited impact if proper file upload validation and server hardening are in place, though the vulnerability still exists.
🎯 Exploit Status
Exploitation requires administrator credentials but is straightforward once access is obtained. Public proof-of-concept exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.40.4 and later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3010794/block-options
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'EditorsKit' or 'Block Options'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.40.4+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the EditorsKit plugin until patched
wp plugin deactivate editorskit
Restrict administrator accounts
allImplement strong authentication controls and limit administrator accounts
🧯 If You Can't Patch
- Implement web application firewall rules to block file uploads to the vulnerable endpoint
- Enable file integrity monitoring on WordPress upload directories and alert on unexpected file creations
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → EditorsKit → Version. If version is 1.40.3 or lower, you are vulnerable.
Check Version:
wp plugin get editorskit --field=version
Verify Fix Applied:
Verify plugin version is 1.40.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-json/gutenberghub-styles-manager/v1/import endpoint
- PHP or executable files in WordPress upload directories with suspicious names
Network Indicators:
- POST requests to /wp-json/gutenberghub-styles-manager/v1/import with file uploads
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-json/gutenberghub-styles-manager/v1/import" OR file_extension IN ("php", "exe", "sh", "py"))
🔗 References
- https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100
- https://plugins.trac.wordpress.org/changeset/3010794/block-options
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve
- https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100
- https://plugins.trac.wordpress.org/changeset/3010794/block-options
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve