CVE-2024-33557
📋 TL;DR
This CVE describes a path traversal vulnerability in the XStore Core WordPress plugin that allows attackers to include arbitrary local PHP files. This affects all WordPress sites running XStore Core versions up to 5.3.8, potentially leading to remote code execution.
💻 Affected Systems
- XStore Core WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data exfiltration, or ransomware deployment
Likely Case
Local file inclusion allowing sensitive file disclosure (configuration files, credentials) or limited code execution
If Mitigated
Unauthorized file read access if proper file permissions restrict execution
🎯 Exploit Status
Path traversal vulnerabilities are well-understood and easy to exploit. Public details available on Patchstack.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.3.9 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-local-file-inclusion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find XStore Core and update to version 5.3.9 or later. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable XStore Core Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate et-core-plugin
Web Application Firewall Rule
allBlock path traversal patterns in requests
Add WAF rule to block requests containing '../' or similar path traversal sequences
🧯 If You Can't Patch
- Implement strict file permissions (644 for files, 755 for directories) to limit damage
- Deploy web application firewall with path traversal detection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for XStore Core version
Check Version:
wp plugin get et-core-plugin --field=version
Verify Fix Applied:
Verify XStore Core version is 5.3.9 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' sequences to WordPress admin-ajax.php or similar endpoints
- Unusual file access patterns in PHP error logs
Network Indicators:
- HTTP requests with path traversal payloads (../../etc/passwd, etc.)
SIEM Query:
web.url:*../* AND (web.url:*admin-ajax* OR web.url:*wp-admin*)