CVE-2024-37423

8.5 HIGH

📋 TL;DR

This path traversal vulnerability in the WordPress Newspack Blocks plugin allows attackers to delete arbitrary directories on the server. It affects WordPress sites using Newspack Blocks versions up to 3.0.8, with contributor-level or higher access being required for exploitation.

💻 Affected Systems

Products:
  • WordPress Newspack Blocks plugin
Versions: All versions up to and including 3.0.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have at least contributor-level access to WordPress.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through deletion of critical system files, leading to service disruption, data loss, or privilege escalation.

🟠

Likely Case

Unauthorized deletion of WordPress files, plugins, or themes causing website malfunction or defacement.

🟢

If Mitigated

Limited impact if proper file permissions and web server configurations restrict write access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple path traversal techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.9 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/newspack-blocks/wordpress-newspack-blocks-plugin-3-0-8-contributor-arbitrary-directory-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Newspack Blocks and update to version 3.0.9 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Restrict Contributor Access

all

Temporarily remove contributor-level access or limit contributor permissions until patching.

Web Server Directory Restrictions

linux

Configure web server to restrict directory traversal attempts via security modules.

# For Apache: mod_security rules
# For Nginx: location block restrictions

🧯 If You Can't Patch

  • Disable or remove the Newspack Blocks plugin entirely
  • Implement strict file system permissions and monitor for unauthorized file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Newspack Blocks version 3.0.8 or earlier.

Check Version:

wp plugin list --name=newspack-blocks --field=version

Verify Fix Applied:

Confirm Newspack Blocks version is 3.0.9 or later in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in WordPress or web server logs
  • Path traversal patterns in request logs (../ sequences)

Network Indicators:

  • HTTP requests containing directory traversal sequences to Newspack Blocks endpoints

SIEM Query:

source="wordpress.log" AND "newspack" AND ("../" OR "..\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export