CVE-2024-31345

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to WordPress sites running the Auto Poster plugin. Attackers can upload malicious files like PHP shells, leading to remote code execution. All WordPress sites using Auto Poster version 1.2 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Auto Poster plugin by Sukhchain Singh
Versions: n/a through 1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Auto Poster plugin enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via remote code execution, allowing attackers to install backdoors, steal data, deface websites, or use the server for further attacks.

🟠

Likely Case

Website defacement, malware injection, credential theft, or unauthorized content posting.

🟢

If Mitigated

Limited impact if file uploads are restricted via web application firewall or server configuration, though the vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and is straightforward via HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://patchstack.com/database/vulnerability/auto-poster/wordpress-auto-poster-plugin-1-2-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Locate 'Auto Poster' and click Deactivate. 4. Click Delete to remove the plugin completely.

🔧 Temporary Workarounds

Restrict file uploads via .htaccess

linux

Block execution of uploaded files in the uploads directory.

Add to .htaccess in wp-content/uploads/: <Files *.php> deny from all </Files>

Web Application Firewall rule

all

Block file uploads with dangerous extensions to the plugin endpoint.

🧯 If You Can't Patch

  • Immediately disable and remove the Auto Poster plugin from all WordPress installations.
  • Implement strict file upload validation at the server level using mod_security or similar tools.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Auto Poster' version 1.2 or earlier.

Check Version:

wp plugin list --name=auto-poster --field=version

Verify Fix Applied:

Confirm the plugin is no longer listed in installed plugins or is deactivated.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/auto-poster/ upload endpoints with file extensions like .php, .phtml, .exe
  • Files with unusual names appearing in wp-content/uploads/

Network Indicators:

  • Unusual outbound connections from the WordPress server post-upload

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/auto-poster/" AND method="POST" AND file_extension IN ("php", "phtml", "exe"))

🔗 References

📤 Share & Export