CVE-2024-12854

8.8 HIGH

📋 TL;DR

The Garden Gnome Package WordPress plugin allows authenticated attackers with Author-level access or higher to upload arbitrary files due to missing file type validation when extracting 'ggpkg' files. This vulnerability can lead to remote code execution on affected WordPress sites. All WordPress sites using this plugin up to version 2.3.0 are vulnerable.

💻 Affected Systems

Products:
  • WordPress Garden Gnome Package plugin
Versions: All versions up to and including 2.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least Author-level WordPress user account (or higher) to exploit. Plugin must be active and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for malicious activities.

🟠

Likely Case

Attackers upload web shells or malicious scripts to gain persistent access, modify site content, or pivot to other systems on the network.

🟢

If Mitigated

Limited to file uploads in the plugin's directory without execution capabilities if proper file permissions and security controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of the vulnerable file upload functionality. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.3.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215986%40garden-gnome-package&new=3215986%40garden-gnome-package&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Garden Gnome Package' and click 'Update Now'. 4. Verify the plugin version is 2.3.1 or higher.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the Garden Gnome Package plugin until patched

wp plugin deactivate garden-gnome-package

Restrict user roles

all

Limit Author-level and higher accounts to trusted users only

🧯 If You Can't Patch

  • Remove the plugin entirely if not needed
  • Implement web application firewall rules to block file uploads to the plugin's endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Garden Gnome Package version. If version is 2.3.0 or lower, you are vulnerable.

Check Version:

wp plugin get garden-gnome-package --field=version

Verify Fix Applied:

After updating, confirm the plugin version shows 2.3.1 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/plugins/garden-gnome-package/
  • Multiple failed login attempts followed by successful Author-level login
  • POST requests to plugin-specific upload endpoints

Network Indicators:

  • HTTP POST requests containing .ggpkg or unusual file extensions to plugin paths
  • Outbound connections from WordPress server to unknown IPs after file uploads

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/garden-gnome-package/" AND method="POST")

🔗 References

📤 Share & Export