CVE-2024-12269

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to download the entire WordPress database through the Safe Ai Malware Protection plugin. Any WordPress site using this plugin version 1.0.17 or earlier is affected. Attackers can access sensitive data including user credentials, content, and configuration.

💻 Affected Systems

Products:
  • Safe Ai Malware Protection for WP WordPress plugin
Versions: All versions up to and including 1.0.17
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database exfiltration leading to credential theft, sensitive data exposure, and potential site takeover if admin credentials are compromised.

🟠

Likely Case

Attackers download the database containing user data, posts, comments, and potentially hashed passwords for offline cracking.

🟢

If Mitigated

With proper network controls and monitoring, unauthorized database exports would be detected and blocked before significant data loss.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP access to the vulnerable endpoint with no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.0.18 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3151237/safe-ai-malware-protection-for-wp/trunk/includes/class-mvsp-export-db.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Safe Ai Malware Protection for WP'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.0.18+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

Block Vulnerable Endpoint

Apache

Use web application firewall or .htaccess to block access to the export_db function.

# Add to .htaccess:
RewriteEngine On
RewriteCond %{QUERY_STRING} export_db [NC]
RewriteRule .* - [F,L]

🧯 If You Can't Patch

  • Immediately disable the Safe Ai Malware Protection plugin via WordPress admin or by renaming its directory.
  • Implement strict network access controls to limit external access to the WordPress installation.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Safe Ai Malware Protection for WP' version 1.0.17 or earlier.

Check Version:

wp plugin list --name='safe-ai-malware-protection-for-wp' --field=version

Verify Fix Applied:

Confirm plugin version is 1.0.18 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to */wp-admin/admin-ajax.php with 'action=export_db' parameter
  • Large database export file downloads from unexpected IP addresses

Network Indicators:

  • Unusual outbound traffic patterns indicating database export
  • HTTP requests to plugin-specific endpoints without authentication

SIEM Query:

source="web_access_logs" AND uri="*/admin-ajax.php" AND query="*action=export_db*"

🔗 References

📤 Share & Export