CVE-2024-33553

9.0 CRITICAL

📋 TL;DR

CVE-2024-33553 is an unauthenticated PHP object injection vulnerability in the XStore Core WordPress plugin. Attackers can exploit deserialization of untrusted data to execute arbitrary code on affected WordPress sites. This affects all WordPress installations using XStore Core versions up to 5.3.5.

💻 Affected Systems

Products:
  • XStore Core WordPress Plugin
Versions: All versions up to and including 5.3.5
Operating Systems: Any OS running WordPress (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with XStore Core plugin enabled. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, site defacement, and backdoor installation leading to persistent access.

🟠

Likely Case

Unauthenticated attackers gain remote code execution capabilities, enabling them to install malware, steal sensitive data, or pivot to other systems.

🟢

If Mitigated

With proper web application firewalls and input validation, exploitation attempts are blocked, limiting impact to failed attack attempts.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: LOW - This primarily affects WordPress plugins, which are typically deployed on internet-facing web servers rather than internal-only systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and proof-of-concept code is publicly available, making this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find XStore Core plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 5.3.6+ from WordPress repository.

🔧 Temporary Workarounds

Disable XStore Core Plugin

linux

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate et-core-plugin

Web Application Firewall Rule

all

Block requests containing serialized PHP object patterns

🧯 If You Can't Patch

  • Implement strict input validation to reject serialized data in user inputs
  • Deploy a web application firewall with rules to detect and block PHP object injection attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → XStore Core version. If version is 5.3.5 or lower, system is vulnerable.

Check Version:

wp plugin get et-core-plugin --field=version

Verify Fix Applied:

Verify XStore Core plugin version is 5.3.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php or plugin endpoints
  • PHP error logs showing unserialize() warnings or errors
  • Web server logs with base64 encoded or serialized data in parameters

Network Indicators:

  • HTTP requests containing serialized PHP object patterns (O: followed by numbers)
  • Requests to XStore Core specific endpoints with unusual parameters

SIEM Query:

source="web_logs" AND (uri_path="*admin-ajax.php*" OR uri_path="*wp-admin*" OR uri_path="*xstore*") AND (query_string="*O:*" OR query_string="*s:*" OR query_string="*a:*" OR query_string="*base64*")

🔗 References

📤 Share & Export