CVE-2024-39619

9.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform local file inclusion (LFI) through path traversal in the ListingPro WordPress plugin. Attackers can read sensitive files like configuration files, potentially leading to further compromise. All WordPress sites using ListingPro versions up to 2.9.3 are affected.

💻 Affected Systems

Products:
  • CridioStudio ListingPro WordPress Plugin
Versions: n/a through 2.9.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ListingPro plugin enabled. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via LFI to remote code execution (RCE) chain, data exfiltration, and website defacement.

🟠

Likely Case

Sensitive file disclosure (wp-config.php, /etc/passwd), credential theft, and potential privilege escalation.

🟢

If Mitigated

Limited to reading non-sensitive files if proper file permissions and web server configurations are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests with path traversal payloads can trigger the vulnerability. Public exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/listingpro-plugin/wordpress-listingpro-plugin-2-9-3-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find ListingPro plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.9.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable ListingPro Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate listingpro-plugin

Web Application Firewall (WAF) Rule

linux

Block path traversal patterns in requests to ListingPro endpoints.

ModSecurity rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny,status:403,msg:'Path Traversal Attempt'

🧯 If You Can't Patch

  • Implement strict file permissions (e.g., 644 for files, 755 for directories) to limit readable files.
  • Use web server configuration to restrict directory traversal (e.g., open_basedir in PHP, nginx try_files).

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > ListingPro version. If version is 2.9.3 or lower, it's vulnerable.

Check Version:

wp plugin get listingpro-plugin --field=version

Verify Fix Applied:

Confirm ListingPro plugin version is 2.9.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns to ListingPro plugin endpoints.
  • Unusual file access attempts in web server logs (e.g., wp-config.php, /etc/passwd).

Network Indicators:

  • HTTP 200 responses with sensitive file contents (e.g., database credentials, system files).
  • Increased traffic to ListingPro-specific URLs with traversal payloads.

SIEM Query:

source="web_logs" AND (url="*listingpro*" AND (url="*../*" OR url="*..\\*"))

🔗 References

📤 Share & Export