CVE-2024-31351
📋 TL;DR
This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites running the Copymatic plugin. Attackers can upload malicious files like PHP shells to gain full control of affected websites. All WordPress sites using Copymatic versions up to 1.6 are affected.
💻 Affected Systems
- Copymatic – AI Content Writer & Generator WordPress plugin
📦 What is this software?
Copymatic by Copymatic
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or use as part of a botnet.
Likely Case
Website defacement, malware distribution, credential theft, and backdoor installation.
If Mitigated
Limited impact if file execution is prevented through proper web server configuration.
🎯 Exploit Status
Public exploit details available on Patchstack. Simple HTTP requests can trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/copymatic/wordpress-copymatic-plugin-1-6-unauthenticated-arbitrary-file-upload-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Copymatic plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin immediately.
🔧 Temporary Workarounds
Disable plugin
allDeactivate the Copymatic plugin to prevent exploitation
wp plugin deactivate copymatic
Restrict upload directory execution
linuxPrevent PHP execution in upload directories
Add 'php_flag engine off' to .htaccess in wp-content/uploads/ directory
🧯 If You Can't Patch
- Immediately deactivate and remove the Copymatic plugin from all WordPress sites
- Implement web application firewall rules to block file upload requests to vulnerable endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Copymatic version ≤1.6
Check Version:
wp plugin get copymatic --field=version
Verify Fix Applied:
Verify plugin version is ≥1.7 or plugin is completely removed
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-content/plugins/copymatic/upload.php with file uploads
- Unexpected PHP file creation in upload directories
Network Indicators:
- HTTP POST requests with file uploads to Copymatic plugin endpoints
- Unusual outbound connections from web server
SIEM Query:
source="web_logs" AND uri="/wp-content/plugins/copymatic/*" AND method="POST" AND file_upload="true"