CVE-2024-13618

7.2 HIGH

📋 TL;DR

The aoa-downloadable WordPress plugin through version 0.1.0 has an authentication bypass vulnerability in its download.php endpoint. This allows unauthenticated attackers to make arbitrary URL requests through the vulnerable WordPress site, potentially leading to server-side request forgery (SSRF) attacks. Any WordPress site using this plugin is affected.

💻 Affected Systems

Products:
  • aoa-downloadable WordPress plugin
Versions: All versions through 0.1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the plugin are vulnerable by default. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use the vulnerable endpoint as a proxy to scan internal networks, access internal services, or perform SSRF attacks against other systems. This could lead to data exfiltration, internal service compromise, or lateral movement within the network.

🟠

Likely Case

Attackers will use the vulnerability to scan internal networks, access metadata services (like AWS/Azure instance metadata), or perform port scanning through the vulnerable WordPress server. This could expose internal infrastructure details and potentially lead to further attacks.

🟢

If Mitigated

With proper network segmentation and egress filtering, the impact is limited to the WordPress server itself acting as a proxy for external requests, potentially exposing server metadata or making external requests on behalf of attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and can be performed with simple HTTP requests to the download.php endpoint with URL parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 0.1.0 (check plugin repository for latest)

Vendor Advisory: https://wpscan.com/vulnerability/d6a78233-3f23-4da4-9bc0-1439cde20a30/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'aoa-downloadable' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable plugin

WordPress

Deactivate and remove the vulnerable plugin from WordPress

wp plugin deactivate aoa-downloadable
wp plugin delete aoa-downloadable

Block access to download.php

all

Use web server configuration to block access to the vulnerable endpoint

# Apache: <Location /wp-content/plugins/aoa-downloadable/download.php>\n    Order deny,allow\n    Deny from all\n</Location>
# Nginx: location ~ /wp-content/plugins/aoa-downloadable/download\.php {\n    deny all;\n    return 403;\n}

🧯 If You Can't Patch

  • Immediately deactivate and remove the aoa-downloadable plugin from all WordPress installations
  • Implement network egress filtering to restrict outbound connections from web servers to only necessary destinations

🔍 How to Verify

Check if Vulnerable:

Check if the plugin is installed and active in WordPress admin panel under Plugins → Installed Plugins. Look for 'aoa-downloadable' plugin with version 0.1.0 or earlier.

Check Version:

wp plugin get aoa-downloadable --field=version

Verify Fix Applied:

After update, verify plugin version is greater than 0.1.0. Test by attempting to access /wp-content/plugins/aoa-downloadable/download.php?url=http://example.com - should return 403 or not be accessible.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/aoa-downloadable/download.php with URL parameters
  • Unusual outbound connections from web server to internal or external IPs following download.php requests
  • Multiple failed authentication attempts followed by download.php access

Network Indicators:

  • Unusual traffic patterns from web server to internal network segments
  • Web server making requests to cloud metadata services (169.254.169.254, 169.254.170.2)
  • Port scanning activity originating from web server IP

SIEM Query:

source="web_server_logs" AND uri="/wp-content/plugins/aoa-downloadable/download.php" AND query_string="*url=*"

🔗 References

📤 Share & Export