CVE-2024-11613

9.8 CRITICAL

📋 TL;DR

This vulnerability in the WordPress File Upload plugin allows unauthenticated attackers to execute arbitrary code, read sensitive files, and delete files on affected WordPress sites. All WordPress sites using the plugin version 4.24.15 or earlier are affected. The issue stems from insufficient input validation in the wfu_file_downloader.php file.

💻 Affected Systems

Products:
  • WordPress File Upload plugin
Versions: All versions up to and including 4.24.15
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and lateral movement to other systems.

🟠

Likely Case

Website defacement, data exfiltration, malware installation, and unauthorized access to sensitive files.

🟢

If Mitigated

Limited impact due to network segmentation, file integrity monitoring, and restricted file permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is easily exploitable with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.24.16 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3217005/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WordPress File Upload' and click 'Update Now'. 4. Verify version is 4.24.16 or higher.

🔧 Temporary Workarounds

Disable vulnerable file

linux

Temporarily disable the vulnerable wfu_file_downloader.php file

mv /path/to/wp-content/plugins/wp-file-upload/wfu_file_downloader.php /path/to/wp-content/plugins/wp-file-upload/wfu_file_downloader.php.disabled

Web server block

all

Block access to the vulnerable file via web server configuration

<LocationMatch "wfu_file_downloader\.php">
    Order deny,allow
    Deny from all
</LocationMatch>

🧯 If You Can't Patch

  • Immediately disable the WordPress File Upload plugin entirely
  • Implement web application firewall rules to block requests to wfu_file_downloader.php

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for WordPress File Upload version. If version is 4.24.15 or lower, you are vulnerable.

Check Version:

grep -r "Version:" /path/to/wp-content/plugins/wp-file-upload/wp-file-upload.php | head -1

Verify Fix Applied:

After updating, verify the plugin version shows 4.24.16 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/wp-file-upload/wfu_file_downloader.php with suspicious parameters
  • Unusual file operations in WordPress upload directories
  • PHP execution errors in web server logs

Network Indicators:

  • POST/GET requests to wfu_file_downloader.php with source parameter containing directory traversal patterns
  • Unusual outbound connections from web server

SIEM Query:

source="web_server_logs" AND uri="*wfu_file_downloader.php*" AND (param="*../*" OR param="*..\\*" OR param="*php://*" OR param="*data://*")

🔗 References

📤 Share & Export