CVE-2024-12036
📋 TL;DR
The CS Framework plugin for WordPress has an arbitrary file read vulnerability that allows authenticated attackers with subscriber-level access or higher to read any file on the server. This affects all versions up to and including 6.9, potentially exposing sensitive configuration files, credentials, and other confidential data.
💻 Affected Systems
- CS Framework WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to sensitive files like wp-config.php containing database credentials, server configuration files, or user data, leading to complete site compromise and data exfiltration.
Likely Case
Attackers read WordPress configuration files to obtain database credentials, then escalate access to take over the website or steal user data.
If Mitigated
With proper access controls and monitoring, unauthorized file access attempts are detected and blocked before sensitive data is exposed.
🎯 Exploit Status
Requires authenticated access but only subscriber-level privileges. Exploitation involves crafting specific requests to the vulnerable function.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 7.0 or higher
Vendor Advisory: https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find CS Framework plugin. 4. Update to version 7.0 or higher. 5. If update not available, deactivate and remove the plugin.
🔧 Temporary Workarounds
Restrict User Registration
allDisable new user registration to prevent attackers from creating subscriber accounts
Remove Subscriber Role Access
allModify user roles to prevent subscribers from accessing vulnerable endpoints
🧯 If You Can't Patch
- Deactivate and remove the CS Framework plugin immediately
- Implement web application firewall rules to block requests to the get_widget_settings_json() function
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > CS Framework version. If version is 6.9 or lower, you are vulnerable.
Check Version:
wp plugin list --name='CS Framework' --field=version
Verify Fix Applied:
After updating, verify CS Framework plugin version is 7.0 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-admin/admin-ajax.php with action=get_widget_settings_json containing file path parameters
- Unusual file read attempts from subscriber-level accounts
Network Indicators:
- POST requests to admin-ajax.php with file path parameters in payload
SIEM Query:
source="wordpress.log" AND "admin-ajax.php" AND "get_widget_settings_json" AND (".." OR "/etc/" OR "/wp-config")