CVE-2024-30509
📋 TL;DR
This path traversal vulnerability in the WordPress SellKit plugin allows attackers to download arbitrary files from the server by manipulating file paths. It affects all WordPress sites running SellKit versions up to 1.8.1. Attackers can potentially access sensitive files like configuration files, user data, or system files.
💻 Affected Systems
- WordPress SellKit Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through retrieval of sensitive configuration files (like wp-config.php containing database credentials), followed by database access, privilege escalation, or installation of backdoors.
Likely Case
Unauthorized access to sensitive files containing user data, configuration details, or other protected information, potentially leading to data breaches or further exploitation.
If Mitigated
Limited impact with proper file permissions, web server restrictions, and security controls preventing access to critical system files.
🎯 Exploit Status
Path traversal vulnerabilities are typically easy to exploit with publicly available tools and techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.8.1
Vendor Advisory: https://patchstack.com/database/vulnerability/sellkit/wordpress-sellkit-plugin-1-8-1-arbitrary-file-download-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SellKit and update to latest version. 4. Alternatively, download latest version from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable SellKit Plugin
allTemporarily deactivate the vulnerable plugin until patching is possible
wp plugin deactivate sellkit
Restrict File Access via .htaccess
linuxAdd rules to prevent directory traversal attempts
RewriteCond %{REQUEST_URI} \.\. [NC]
RewriteRule .* - [F]
🧯 If You Can't Patch
- Implement strict file permissions (chmod 600 for sensitive files, 755 for directories)
- Deploy web application firewall (WAF) with path traversal protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for SellKit version 1.8.1 or earlier
Check Version:
wp plugin get sellkit --field=version
Verify Fix Applied:
Confirm SellKit version is greater than 1.8.1 in WordPress plugins list
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with ../ sequences in URL parameters
- Unusual file access patterns from web directories
- Failed attempts to access sensitive system files
Network Indicators:
- HTTP requests containing directory traversal sequences (../, ..\, %2e%2e%2f)
- Unusual file downloads from web application paths
SIEM Query:
source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")