CVE-2024-31240
📋 TL;DR
This path traversal vulnerability in the WordPress WP Poll Maker plugin allows authenticated users with subscriber-level access to delete arbitrary files on the server. It affects all versions up to 3.1, potentially enabling attackers to delete critical system files or disrupt website functionality.
💻 Affected Systems
- WordPress WP Poll Maker plugin
📦 What is this software?
Wp Poll Maker by Infotheme
⚠️ Risk & Real-World Impact
Worst Case
Complete website compromise through deletion of WordPress core files, configuration files, or system files, leading to site unavailability, data loss, or privilege escalation.
Likely Case
Website defacement or disruption through deletion of theme/plugin files, causing broken functionality and potential data loss for affected polls.
If Mitigated
Limited impact if proper file permissions restrict subscriber access and web server runs with minimal privileges.
🎯 Exploit Status
Exploitation requires subscriber-level credentials. Public proof-of-concept demonstrates file deletion capability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-subscriber-arbitrary-file-deletion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Poll Maker and click 'Update Now'. 4. Verify version is 3.2 or higher.
🔧 Temporary Workarounds
Disable plugin temporarily
allDeactivate the vulnerable plugin until patched
wp plugin deactivate epoll-wp-voting
Restrict subscriber file permissions
linuxImplement strict file permissions to limit damage
chmod 644 wp-config.php
chmod 755 wp-content
🧯 If You Can't Patch
- Remove subscriber role from all non-essential users
- Implement web application firewall rules to block path traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → WP Poll Maker version. If version is 3.1 or lower, you are vulnerable.
Check Version:
wp plugin get epoll-wp-voting --field=version
Verify Fix Applied:
Verify plugin version is 3.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file deletion events in web server logs
- Multiple failed file access attempts with ../ patterns
- Subscriber users accessing file deletion endpoints
Network Indicators:
- HTTP requests containing ../ patterns to poll maker endpoints
- POST requests to poll deletion endpoints from subscriber accounts
SIEM Query:
source="web_server.log" AND (uri="*../*" OR method="POST") AND uri="*/wp-poll-maker/*"
🔗 References
- https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve