CVE-2024-10763

9.8 CRITICAL

📋 TL;DR

The Campress WordPress theme contains a Local File Inclusion vulnerability that allows unauthenticated attackers to include and execute arbitrary PHP files on the server. This can lead to remote code execution, data theft, and complete system compromise. All WordPress sites using Campress theme version 1.35 or earlier are affected.

💻 Affected Systems

Products:
  • Campress WordPress Theme
Versions: All versions up to and including 1.35
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Campress theme installed. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover via remote code execution, data exfiltration, installation of persistent backdoors, and lateral movement to other systems.

🟠

Likely Case

Website defacement, credential theft, installation of cryptocurrency miners or malware, and data breach of sensitive information.

🟢

If Mitigated

Limited impact if file uploads are restricted and web server runs with minimal privileges, though information disclosure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability via the campress_woocommerce_get_ajax_products function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.35

Vendor Advisory: https://themeforest.net/item/campress-responsive-education-courses-and-events-wordpress-theme/19355619

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Campress theme update is available. 4. Update to latest version. 5. Clear WordPress cache if applicable.

🔧 Temporary Workarounds

Disable vulnerable function

all

Remove or disable the campress_woocommerce_get_ajax_products function from theme files

# Locate theme directory: wp-content/themes/campress
# Backup theme files first
# Edit functions.php or relevant theme file to remove/comment out vulnerable function

Web Application Firewall rule

linux

Block requests containing local file inclusion patterns

# Example ModSecurity rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny,msg:'Local File Inclusion attempt'

🧯 If You Can't Patch

  • Immediately disable or remove the Campress theme and switch to a secure alternative
  • Implement strict file upload restrictions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Campress theme version 1.35 or earlier

Check Version:

grep -r "Version:" wp-content/themes/campress/style.css

Verify Fix Applied:

Verify theme version is updated beyond 1.35 and test that campress_woocommerce_get_ajax_products function no longer accepts file path parameters

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with action=campress_woocommerce_get_ajax_products containing file path parameters
  • Unusual file inclusion attempts in web server logs
  • PHP errors related to file inclusion

Network Indicators:

  • POST requests with file path traversal sequences (../) to WordPress AJAX endpoints
  • Unusual outbound connections from web server after exploitation

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND (params.action="campress_woocommerce_get_ajax_products" OR params CONTAINS "../")

🔗 References

📤 Share & Export