CVE-2024-24714
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites using the Icons Font Loader plugin. It affects all WordPress installations with the plugin versions up to 1.1.4. Attackers can upload malicious files including PHP scripts to gain unauthorized access.
💻 Affected Systems
- WordPress Icons Font Loader plugin by bPlugins LLC
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or pivot to internal networks.
Likely Case
Website defacement, malware distribution, credential theft, or unauthorized administrative access to the WordPress site.
If Mitigated
Limited impact if file uploads are restricted at web server level or if the vulnerable plugin is disabled.
🎯 Exploit Status
Exploitation requires no authentication and is straightforward due to unrestricted file upload functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.5 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Icons Font Loader. 4. Click Update Now if available. 5. Alternatively, download version 1.1.5+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Icons Font Loader plugin until patched.
wp plugin deactivate icons-font-loader
Restrict file uploads via .htaccess
linuxBlock upload of executable files in WordPress upload directory.
<FilesMatch "\.(php|php3|php4|php5|phtml|pl|py|jsp|asp|sh|cgi)$">
Order Allow,Deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Remove the Icons Font Loader plugin completely from the WordPress installation.
- Implement web application firewall rules to block file upload requests to the vulnerable endpoint.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Icons Font Loader version. If version is 1.1.4 or lower, system is vulnerable.
Check Version:
wp plugin get icons-font-loader --field=version
Verify Fix Applied:
Verify plugin version is 1.1.5 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/icons-font-loader/
- POST requests to plugin upload endpoints with executable file extensions
- 404 errors for unexpected PHP files in upload directories
Network Indicators:
- HTTP POST requests to /wp-content/plugins/icons-font-loader/upload.php or similar endpoints
- Uploads of files with .php, .exe, or other executable extensions
SIEM Query:
source="web_server" AND (uri_path="/wp-content/plugins/icons-font-loader/" AND method="POST") AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")
🔗 References
- https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/icons-font-loader/wordpress-icons-font-loader-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve