CVE-2024-10470

9.8 CRITICAL

📋 TL;DR

This vulnerability in the WPLMS WordPress theme allows unauthenticated attackers to read and delete arbitrary files on the server due to insufficient path validation. All WordPress sites using WPLMS theme version 4.962 or earlier are affected, even when the theme is not activated. This can lead to complete site compromise through remote code execution.

💻 Affected Systems

Products:
  • WPLMS Learning Management System WordPress Theme
Versions: All versions up to and including 4.962
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable even when theme is not activated. Requires WordPress installation with WPLMS theme present.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover via remote code execution by deleting critical files like wp-config.php, leading to database compromise, file system access, and potential server-wide impact.

🟠

Likely Case

Site defacement, data theft, or denial of service through deletion of critical WordPress files, potentially requiring full site restoration from backups.

🟢

If Mitigated

Limited impact if proper file permissions, web application firewalls, and intrusion detection systems are in place to block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires minimal technical skill. Public proof-of-concept code is available, making automated attacks probable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.962

Vendor Advisory: https://themeforest.net/item/wplms-learning-management-system/6780226

Restart Required: No

Instructions:

1. Update WPLMS theme to latest version via WordPress admin panel. 2. If auto-update unavailable, download latest version from ThemeForest. 3. Replace theme files via FTP/SFTP. 4. Clear WordPress cache.

🔧 Temporary Workarounds

Remove vulnerable theme

linux

Completely remove WPLMS theme from WordPress installation

rm -rf /path/to/wordpress/wp-content/themes/wplms

Web Application Firewall rule

all

Block requests to vulnerable theme endpoints

# Add rule to block requests to wplms theme files
# Example for mod_security: SecRule REQUEST_URI "@contains /wp-content/themes/wplms/" "id:1001,deny"

🧯 If You Can't Patch

  • Immediately remove WPLMS theme from all WordPress installations
  • Implement strict file permissions (644 for files, 755 for directories) and disable PHP execution in uploads directory

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for WPLMS theme version 4.962 or earlier

Check Version:

grep -r "Version:" /path/to/wordpress/wp-content/themes/wplms/style.css

Verify Fix Applied:

Verify WPLMS theme version is greater than 4.962 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/themes/wplms/ with file path parameters
  • File deletion events in system logs
  • Unauthorized access to wp-config.php or other sensitive files

Network Indicators:

  • Unusual POST/GET requests to theme files with file path parameters
  • Traffic patterns matching known exploit signatures

SIEM Query:

source="web_logs" AND (uri="/wp-content/themes/wplms/*" AND (param="file" OR param="path"))

🔗 References

📤 Share & Export