CVE-2024-43129
📋 TL;DR
This path traversal vulnerability in the WordPress BetterDocs plugin allows attackers to include local PHP files through improper path validation. It affects all WordPress sites running BetterDocs versions up to 3.5.8, potentially enabling unauthorized file access and code execution.
💻 Affected Systems
- WordPress BetterDocs plugin
📦 What is this software?
Betterdocs by Wpdeveloper
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and website defacement.
Likely Case
Sensitive file disclosure including configuration files, database credentials, and user data.
If Mitigated
Limited impact with proper file permissions and web server restrictions in place.
🎯 Exploit Status
Public exploit details available on security research sites.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.9 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/betterdocs/wordpress-betterdocs-plugin-3-5-8-local-file-inclusion-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find BetterDocs and click 'Update Now'
4. Verify version is 3.5.9 or higher
🔧 Temporary Workarounds
Disable BetterDocs plugin
allTemporarily deactivate the vulnerable plugin until patched
wp plugin deactivate betterdocs
Web server path restriction
linuxConfigure web server to block traversal attempts
# Add to .htaccess for Apache:
RewriteCond %{REQUEST_URI} \.\./ [NC]
RewriteRule .* - [F]
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block path traversal patterns
- Restrict file permissions and disable PHP execution in sensitive directories
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > BetterDocs version
Check Version:
wp plugin list --name=betterdocs --field=version
Verify Fix Applied:
Confirm BetterDocs version is 3.5.9 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../' patterns to BetterDocs endpoints
- Unusual file access attempts in web server logs
Network Indicators:
- HTTP requests with path traversal sequences (../, ..\) to plugin files
SIEM Query:
web.url:*betterdocs* AND web.url:*../*