CVE-2024-32836

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files, including malicious scripts, to WordPress sites running the vulnerable WP-Lister Lite for eBay plugin. Attackers can achieve remote code execution, compromising the entire website. All WordPress sites using affected plugin versions are at risk.

💻 Affected Systems

Products:
  • WP-Lister Lite for eBay WordPress plugin
Versions: All versions up to and including 3.5.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin active. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover, data theft, malware distribution, and server compromise leading to lateral movement within the hosting environment.

🟠

Likely Case

Website defacement, backdoor installation, credential theft, and use as a malware distribution platform.

🟢

If Mitigated

Limited impact if file execution restrictions are in place, but still allows DoS through disk space exhaustion.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and the exploit requires no authentication.
🏢 Internal Only: LOW - This primarily affects public-facing WordPress installations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with malicious file upload. Public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.12 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-lister-for-ebay/wordpress-wp-lister-lite-for-ebay-plugin-3-5-11-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find WP-Lister Lite for eBay. 4. Click 'Update Now' if available. 5. Alternatively, delete and reinstall latest version from WordPress repository.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate WP-Lister Lite for eBay until patched

wp plugin deactivate wp-lister-for-ebay

Restrict file uploads via .htaccess

linux

Block PHP file execution in uploads directory

<FilesMatch "\.(php|php5|phtml|phar)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove plugin entirely and use alternative eBay listing solution
  • Implement web application firewall (WAF) rules to block file uploads to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → WP-Lister Lite for eBay version. If version ≤ 3.5.11, vulnerable.

Check Version:

wp plugin get wp-lister-for-ebay --field=version

Verify Fix Applied:

Confirm plugin version is 3.5.12 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/wp-lister-for-ebay/ with file uploads
  • Unexpected .php files in upload directories
  • Web server errors related to file upload restrictions

Network Indicators:

  • Unusual file upload traffic to WordPress paths
  • POST requests with multipart/form-data to plugin endpoints

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/wp-lister-for-ebay/" AND method="POST" AND content_type="multipart/form-data")

🔗 References

📤 Share & Export