CVE-2024-34433

4.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious PHP objects through deserialization of untrusted data in the One Click Demo Import WordPress plugin. It affects all WordPress sites using versions up to 3.2.0 of this plugin, potentially leading to remote code execution or other malicious activities.

💻 Affected Systems

Products:
  • WordPress One Click Demo Import Plugin
Versions: n/a through 3.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or malware installation.

🟠

Likely Case

Arbitrary file upload leading to backdoor installation or limited code execution.

🟢

If Mitigated

Attack blocked at WAF level or plugin disabled, no impact.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability can be exploited remotely.
🏢 Internal Only: LOW - Internal-only WordPress instances are less likely targets.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/one-click-demo-import/wordpress-one-click-demo-import-plugin-3-2-0-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find One Click Demo Import. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.2.1+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate one-click-demo-import

WAF Rule

all

Block suspicious deserialization attempts at web application firewall.

🧯 If You Can't Patch

  • Remove plugin entirely if not essential for site functionality
  • Implement strict file upload restrictions and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → One Click Demo Import → Version. If version is 3.2.0 or earlier, you are vulnerable.

Check Version:

wp plugin get one-click-demo-import --field=version

Verify Fix Applied:

Verify plugin version is 3.2.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints
  • PHP object injection attempts in logs
  • Unexpected file uploads

Network Indicators:

  • HTTP requests containing serialized PHP objects
  • Traffic to known exploit patterns

SIEM Query:

source="wordpress.log" AND "one-click-demo-import" AND ("unserialize" OR "php_object")

🔗 References

📤 Share & Export