CVE-2024-38734

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to WordPress sites using the Import Spreadsheets from Microsoft Excel plugin, potentially leading to code execution. It affects all versions up to 10.1.4. WordPress administrators using this plugin are at risk.

💻 Affected Systems

Products:
  • Import Spreadsheets from Microsoft Excel WordPress plugin
Versions: n/a through 10.1.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with this plugin enabled. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through remote code execution, allowing attackers to install backdoors, steal data, or pivot to other systems.

🟠

Likely Case

Website defacement, malware injection, or creation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if file uploads are restricted to authenticated users only and proper file validation is in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to WordPress, but once obtained, uploading malicious files is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.5

Vendor Advisory: https://patchstack.com/database/vulnerability/import-spreadsheets-from-microsoft-excel/wordpress-import-spreadsheets-from-microsoft-excel-plugin-10-1-4-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Import Spreadsheets from Microsoft Excel'. 4. Click 'Update Now' if available, or manually update to version 10.1.5 or later.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate import-spreadsheets-from-microsoft-excel

Restrict File Uploads

all

Configure web server to block uploads of executable file types.

# In .htaccess for Apache:
<FilesMatch "\.(php|phtml|php3|php4|php5|pl|py|jsp|asp|sh|cgi)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>
# In nginx config:
location ~* \.(php|phtml|php3|php4|php5|pl|py|jsp|asp|sh|cgi)$ {
  deny all;
}

🧯 If You Can't Patch

  • Disable the Import Spreadsheets from Microsoft Excel plugin immediately.
  • Implement strict file upload validation and restrict uploads to authenticated administrators only.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Import Spreadsheets from Microsoft Excel' version.

Check Version:

wp plugin get import-spreadsheets-from-microsoft-excel --field=version

Verify Fix Applied:

Confirm plugin version is 10.1.5 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to WordPress uploads directory, especially executable files.
  • HTTP POST requests to plugin-specific endpoints with file uploads.

Network Indicators:

  • Unexpected outbound connections from web server post-file upload.

SIEM Query:

source="wordpress.log" AND ("import-spreadsheets" OR "upload" AND ".php" OR ".phtml")

🔗 References

📤 Share & Export