CVE-2024-10705
📋 TL;DR
The Multiple Page Generator Plugin (MPG) for WordPress versions up to 4.0.5 contains a Server-Side Request Forgery (SSRF) vulnerability in the 'mpg_download_file_by_link' function. This allows authenticated attackers with editor-level privileges or higher to make arbitrary web requests from the vulnerable server, potentially accessing internal services. WordPress sites using the vulnerable MPG plugin are affected.
💻 Affected Systems
- Multiple Page Generator Plugin – MPG for WordPress
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal services, exfiltrate data from internal networks, or perform attacks against internal systems that trust the WordPress server.
Likely Case
Attackers with editor access could probe internal networks, access metadata services, or interact with internal APIs to gather information.
If Mitigated
With proper network segmentation and least privilege access, impact is limited to the WordPress server's network segment.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.6
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3205550/multiple-pages-generator-by-porthas
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Multiple Page Generator Plugin – MPG'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.0.6+ from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable MPG Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate multiple-pages-generator-by-porthas
Restrict Editor Access
allReview and limit users with editor-level permissions
🧯 If You Can't Patch
- Implement network segmentation to isolate WordPress server from internal services
- Apply web application firewall rules to block SSRF patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for MPG plugin version
Check Version:
wp plugin get multiple-pages-generator-by-porthas --field=version
Verify Fix Applied:
Verify plugin version is 4.0.6 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from WordPress server to internal IPs
- Multiple failed authentication attempts followed by SSRF patterns
Network Indicators:
- WordPress server making requests to internal services (metadata, databases, APIs)
- Unusual traffic patterns from web server to non-standard ports
SIEM Query:
source="wordpress.log" AND ("mpg_download_file_by_link" OR "download_file_by_link")