CVE-2024-49285

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in the SSV MailChimp WordPress plugin allows attackers to include local PHP files through improper path validation. It affects all WordPress sites running SSV MailChimp plugin versions up to 3.1.5, potentially leading to sensitive file disclosure or code execution.

💻 Affected Systems

Products:
  • SSV MailChimp WordPress Plugin
Versions: n/a through 3.1.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and website defacement.

🟠

Likely Case

Sensitive file disclosure (configuration files, database credentials) and limited code execution.

🟢

If Mitigated

Unauthorized file read access to web-accessible files only.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Internal WordPress installations could still be exploited by internal threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal payloads can exploit this vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ssv-mailchimp/wordpress-ssv-mailchimp-plugin-3-1-5-local-file-inclusion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find SSV MailChimp plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 3.1.6+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate ssv-mailchimp

Web Application Firewall Rule

linux

Block path traversal patterns in requests.

ModSecurity rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny,status:403,msg:'Path Traversal Attempt'

🧯 If You Can't Patch

  • Implement strict file permission controls on web server directories
  • Deploy web application firewall with path traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → SSV MailChimp version. If version ≤ 3.1.5, vulnerable.

Check Version:

wp plugin get ssv-mailchimp --field=version

Verify Fix Applied:

Verify plugin version is 3.1.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns to plugin endpoints
  • Unusual file access attempts in web server logs

Network Indicators:

  • HTTP requests with path traversal payloads to /wp-content/plugins/ssv-mailchimp/

SIEM Query:

source="web_server.log" AND (uri="*../*" AND uri="*ssv-mailchimp*")

🔗 References

📤 Share & Export