CVE-2024-31343
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPress plugin that allows unauthenticated attackers to download arbitrary files from the server. It affects all WordPress sites running the plugin from any version up to and including 4.10.1.
💻 Affected Systems
- MP3 Audio Player for Music, Radio & Podcast by Sonaar WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could download sensitive files like wp-config.php containing database credentials, potentially leading to complete site compromise and data exfiltration.
Likely Case
Unauthenticated attackers downloading configuration files, source code, or other sensitive files from vulnerable WordPress installations.
If Mitigated
With proper file permissions and web server restrictions, impact would be limited to publicly accessible files only.
🎯 Exploit Status
The vulnerability is simple to exploit and public exploit details are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.10.2 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'MP3 Audio Player for Music, Radio & Podcast by Sonaar'. 4. Click 'Update Now' or manually update to version 4.10.2+. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patching is possible
wp plugin deactivate mp3-music-player-by-sonaar
Restrict Access via .htaccess
linuxBlock access to plugin files via web server configuration
<FilesMatch "\.(php|inc|txt|sql)$">
Order Allow,Deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Remove the plugin completely from the WordPress installation
- Implement strict file permissions and disable directory listing on the web server
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > MP3 Audio Player for Music, Radio & Podcast by Sonaar version
Check Version:
wp plugin get mp3-music-player-by-sonaar --field=version
Verify Fix Applied:
Verify plugin version is 4.10.2 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns to plugin directories
- HTTP requests to plugin endpoints with file path parameters
Network Indicators:
- HTTP requests containing 'download' or file path traversal patterns to plugin endpoints
SIEM Query:
web_access_logs WHERE uri CONTAINS '/wp-content/plugins/mp3-music-player-by-sonaar/' AND (uri CONTAINS 'download' OR uri CONTAINS '../')
🔗 References
- https://patchstack.com/database/vulnerability/mp3-music-player-by-sonaar/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-1-arbitrary-file-download-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/mp3-music-player-by-sonaar/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-1-arbitrary-file-download-vulnerability?_s_id=cve