CVE-2024-13091

9.8 CRITICAL

📋 TL;DR

The WPBot Pro WordPress Chatbot plugin has a critical vulnerability allowing unauthenticated attackers to upload arbitrary files due to missing file type validation. This affects all WordPress sites using WPBot Pro plugin versions up to 13.5.4, potentially leading to remote code execution. The exploit requires both the ChatBot Conversational Forms plugin and Conversational Form Builder Pro addon to be installed.

💻 Affected Systems

Products:
  • WPBot Pro WordPress Chatbot plugin
  • ChatBot Conversational Forms plugin
  • Conversational Form Builder Pro addon
Versions: All versions up to and including 13.5.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires all three components: WPBot Pro plugin, ChatBot Conversational Forms plugin, and Conversational Form Builder Pro addon.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.

🟠

Likely Case

Attackers upload web shells to gain persistent access, deface websites, or install cryptocurrency miners.

🟢

If Mitigated

File uploads blocked, but attackers may still attempt exploitation attempts visible in logs.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and the vulnerability requires no authentication.
🏢 Internal Only: LOW - Unless the WordPress site is accessible internally to untrusted users.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is straightforward - attackers can upload malicious files without authentication using the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.5.5 or later

Vendor Advisory: https://www.wpbot.pro/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find WPBot Pro plugin. 4. Update to version 13.5.5 or later. 5. Verify ChatBot Conversational Forms and Conversational Form Builder Pro are also updated if separate updates exist.

🔧 Temporary Workarounds

Disable vulnerable plugins

all

Temporarily disable WPBot Pro, ChatBot Conversational Forms, and Conversational Form Builder Pro plugins until patched.

wp plugin deactivate wpbot-pro
wp plugin deactivate chatbot-conversational-forms
wp plugin deactivate conversational-form-builder-pro

Web Application Firewall rule

linux

Block requests to the vulnerable endpoint qcld_wpcfb_file_upload.

# Example mod_security rule: SecRule REQUEST_URI "@contains qcld_wpcfb_file_upload" "id:1001,phase:1,deny,status:403"

🧯 If You Can't Patch

  • Immediately disable all three vulnerable plugins completely.
  • Restrict file upload permissions in WordPress to authenticated users only via .htaccess or web server configuration.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > WPBot Pro version. If version is 13.5.4 or lower and both required plugins are active, the site is vulnerable.

Check Version:

wp plugin get wpbot-pro --field=version

Verify Fix Applied:

Verify WPBot Pro plugin version is 13.5.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=qcld_wpcfb_file_upload
  • File uploads of unusual file types (php, exe, etc.) to upload directories
  • Increased file upload activity from single IPs

Network Indicators:

  • HTTP POST requests to admin-ajax.php with file upload parameters
  • Traffic spikes to upload directories

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="qcld_wpcfb_file_upload"

🔗 References

📤 Share & Export