CVE-2024-35743
📋 TL;DR
This path traversal vulnerability in the Siteclean SC filechecker WordPress plugin allows attackers to manipulate files outside intended directories. It affects all versions up to 0.6, potentially enabling arbitrary file deletion on vulnerable WordPress installations.
💻 Affected Systems
- Siteclean SC filechecker WordPress plugin
📦 What is this software?
Sc Filechecker by Sc Filechecker Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical system files, website defacement, or installation of backdoors leading to data theft and service disruption.
Likely Case
Website defacement, deletion of WordPress files causing site downtime, or manipulation of configuration files to gain administrative access.
If Mitigated
Limited impact with proper file permissions and web server restrictions, potentially only affecting non-critical files within the web directory.
🎯 Exploit Status
Path traversal vulnerabilities are commonly exploited with simple HTTP requests. Public proof-of-concept exists in vulnerability databases.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 0.6 (check for updates)
Vendor Advisory: https://patchstack.com/database/vulnerability/wp-file-checker/wordpress-sc-filechecker-plugin-0-6-arbitrary-file-deletion-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find SC filechecker plugin. 4. Click 'Update Now' if available. 5. If no update, deactivate and delete the plugin immediately.
🔧 Temporary Workarounds
Disable vulnerable plugin
allDeactivate the SC filechecker plugin to prevent exploitation
wp plugin deactivate sc-filechecker
Restrict file permissions
linuxSet strict file permissions on web directory to limit damage
chmod 644 wp-content/plugins/sc-filechecker/*
chmod 755 wp-content/plugins/sc-filechecker/
🧯 If You Can't Patch
- Deactivate and remove the SC filechecker plugin immediately
- Implement web application firewall (WAF) rules to block path traversal patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for SC filechecker version 0.6 or earlier
Check Version:
wp plugin get sc-filechecker --field=version
Verify Fix Applied:
Verify plugin is either updated to version after 0.6 or completely removed from plugins directory
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' patterns to plugin endpoints
- File deletion operations in web server logs
- 404 errors for unexpected file paths
Network Indicators:
- HTTP requests with path traversal sequences to /wp-content/plugins/sc-filechecker/
SIEM Query:
source="web_server" AND (uri="*../*" AND uri="*sc-filechecker*")