CVE-2024-10705

5.4 MEDIUM

📋 TL;DR

The Multiple Page Generator Plugin (MPG) for WordPress versions up to 4.0.5 contains a Server-Side Request Forgery (SSRF) vulnerability in the 'mpg_download_file_by_link' function. This allows authenticated attackers with editor-level privileges or higher to make arbitrary web requests from the vulnerable server, potentially accessing internal services. WordPress sites using the vulnerable MPG plugin are affected.

💻 Affected Systems

Products:
  • Multiple Page Generator Plugin – MPG for WordPress
Versions: All versions up to and including 4.0.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have editor-level WordPress access or higher. Plugin must be active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal services, exfiltrate data from internal networks, or perform attacks against internal systems that trust the WordPress server.

🟠

Likely Case

Attackers with editor access could probe internal networks, access metadata services, or interact with internal APIs to gather information.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact is limited to the WordPress server's network segment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.6

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3205550/multiple-pages-generator-by-porthas

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Multiple Page Generator Plugin – MPG'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.0.6+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable MPG Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate multiple-pages-generator-by-porthas

Restrict Editor Access

all

Review and limit users with editor-level permissions

🧯 If You Can't Patch

  • Implement network segmentation to isolate WordPress server from internal services
  • Apply web application firewall rules to block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for MPG plugin version

Check Version:

wp plugin get multiple-pages-generator-by-porthas --field=version

Verify Fix Applied:

Verify plugin version is 4.0.6 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from WordPress server to internal IPs
  • Multiple failed authentication attempts followed by SSRF patterns

Network Indicators:

  • WordPress server making requests to internal services (metadata, databases, APIs)
  • Unusual traffic patterns from web server to non-standard ports

SIEM Query:

source="wordpress.log" AND ("mpg_download_file_by_link" OR "download_file_by_link")

🔗 References

📤 Share & Export