CVE-2024-10957

8.8 HIGH

📋 TL;DR

The UpdraftPlus WordPress backup plugin contains a PHP object injection vulnerability in versions 1.23.8 through 1.24.11. Unauthenticated attackers can exploit this when an administrator performs a search-and-replace operation, potentially leading to arbitrary code execution if another plugin or theme provides a suitable POP chain. WordPress sites using vulnerable UpdraftPlus versions are affected.

💻 Affected Systems

Products:
  • UpdraftPlus: WP Backup & Migration Plugin for WordPress
Versions: 1.23.8 to 1.24.11
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator to perform search-and-replace operation; impact depends on presence of POP chains in other installed plugins/themes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or server takeover if a POP chain exists in another installed component.

🟠

Likely Case

Limited impact due to requirement for administrator action and lack of known POP chains in UpdraftPlus itself, but potential for data exposure or file manipulation if vulnerable plugins/themes are present.

🟢

If Mitigated

No impact if UpdraftPlus is patched or if no other plugins/themes with POP chains are installed.

🌐 Internet-Facing: MEDIUM - Requires administrator action but affects internet-facing WordPress sites; risk increases with additional vulnerable components.
🏢 Internal Only: LOW - Same technical vulnerability but reduced attack surface on internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrator action (search-and-replace) and depends on presence of POP chains in other components; no known POP chains in UpdraftPlus itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.24.12 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3212299/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find UpdraftPlus and click 'Update Now'. 4. Verify version is 1.24.12 or higher.

🔧 Temporary Workarounds

Disable UpdraftPlus temporarily

WordPress

Deactivate the plugin until patching is possible

wp plugin deactivate updraftplus

🧯 If You Can't Patch

  • Restrict administrator access to trusted IP addresses only
  • Monitor for suspicious search-and-replace operations in WordPress logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → UpdraftPlus version; if between 1.23.8 and 1.24.11 inclusive, vulnerable.

Check Version:

wp plugin get updraftplus --field=version

Verify Fix Applied:

Confirm UpdraftPlus version is 1.24.12 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search-and-replace operations in WordPress logs
  • PHP deserialization errors in web server logs

Network Indicators:

  • POST requests to admin-ajax.php with serialized data
  • Unexpected file operations following search-and-replace actions

SIEM Query:

source="wordpress.log" AND "search-replace" AND ("updraftplus" OR "admin-ajax.php")

🔗 References

📤 Share & Export