CVE-2024-31292

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to WordPress sites running the Moove Agency Import XML and RSS Feeds plugin. Attackers can exploit this to upload malicious files like PHP shells, potentially leading to remote code execution. All WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • Moove Agency Import XML and RSS Feeds WordPress plugin
Versions: n/a through 2.1.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin enabled are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through remote code execution, allowing attackers to deface websites, steal data, install backdoors, or pivot to other systems.

🟠

Likely Case

Attackers upload web shells to gain persistent access, deface websites, or use the server for malicious activities like phishing or malware distribution.

🟢

If Mitigated

File uploads are blocked or properly validated, preventing malicious file execution while maintaining legitimate import functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher, but the vulnerability is well-documented and easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.6

Vendor Advisory: https://patchstack.com/database/vulnerability/import-xml-feed/wordpress-import-xml-and-rss-feeds-plugin-2-1-5-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Import XML and RSS Feeds'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.1.6+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate import-xml-feed

Restrict File Uploads

all

Configure web server to block execution of uploaded files in the plugin's upload directory.

Add 'Deny from all' to .htaccess in upload directory or equivalent web server configuration

🧯 If You Can't Patch

  • Remove the plugin entirely if not essential for site functionality
  • Implement strict file upload validation at the application or web server level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Import XML and RSS Feeds' version 2.1.5 or lower.

Check Version:

wp plugin get import-xml-feed --field=version

Verify Fix Applied:

Verify plugin version shows 2.1.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to plugin directories
  • POST requests to import functionality with unexpected file types
  • Execution of uploaded PHP files

Network Indicators:

  • HTTP requests uploading files with .php, .phtml, or other executable extensions to plugin endpoints

SIEM Query:

source="web_access.log" AND (uri="/wp-content/plugins/import-xml-feed/" OR uri LIKE "%/wp-admin/admin-ajax.php%") AND (method="POST" AND (file_ext="php" OR file_ext="phtml" OR file_ext="exe"))

🔗 References

📤 Share & Export