CVE-2024-11635

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers running the vulnerable File Upload plugin. All WordPress sites using this plugin up to version 4.24.12 are affected, potentially compromising the entire server.

💻 Affected Systems

Products:
  • WordPress File Upload plugin
Versions: All versions up to and including 4.24.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated. No special configuration needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover, data exfiltration, ransomware deployment, and lateral movement to other systems in the network.

🟠

Likely Case

Website defacement, malware installation, credential theft, and backdoor persistence on the compromised server.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial via cookie manipulation. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.24.13 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3158986/wp-file-upload/trunk/wfu_file_downloader.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'WordPress File Upload'. 4. Click 'Update Now' if available. 5. Alternatively, download version 4.24.13+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

linux

Temporarily disable the WordPress File Upload plugin until patched

mv /path/to/wp-content/plugins/wp-file-upload /path/to/wp-content/plugins/wp-file-upload.disabled

Web Application Firewall rule

all

Block requests containing the malicious 'wfu_ABSPATH' cookie parameter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WordPress server from critical assets
  • Deploy a web application firewall with rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > WordPress File Upload version. If version is 4.24.12 or lower, you are vulnerable.

Check Version:

grep -r "Version:" /path/to/wp-content/plugins/wp-file-upload/wp-file-upload.php | head -1

Verify Fix Applied:

Verify plugin version is 4.24.13 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with 'wfu_ABSPATH' cookie containing suspicious values
  • Unusual PHP file creation/modification in WordPress directories
  • Web server error logs showing code execution attempts

Network Indicators:

  • Outbound connections from WordPress server to unknown IPs post-exploitation
  • Unusual spikes in traffic to the vulnerable endpoint

SIEM Query:

source="web_logs" AND (cookie="*wfu_ABSPATH*" OR uri="*/wfu_file_downloader.php*")

🔗 References

📤 Share & Export