CVE-2024-49327

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, to WordPress servers running the vulnerable Woostagram Connect plugin. Attackers can achieve remote code execution and full server compromise. All WordPress sites using Woostagram Connect versions up to 1.0.2 are affected.

💻 Affected Systems

Products:
  • Woostagram Connect WordPress Plugin
Versions: n/a through 1.0.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with persistent backdoor installation, data exfiltration, and lateral movement to other systems.

🟠

Likely Case

Web shell upload leading to website defacement, data theft, and cryptocurrency mining malware deployment.

🟢

If Mitigated

File uploads blocked at web application firewall level, preventing exploitation but leaving vulnerability unpatched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests with malicious file uploads can exploit this vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woostagram-connect/wordpress-woostagram-connect-plugin-1-0-2-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Woostagram Connect. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block file uploads to Woostagram Connect endpoints

WAF specific - configure to block POST requests containing file uploads to /wp-content/plugins/woostagram-connect/

File System Permissions

linux

Restrict write permissions to plugin upload directories

chmod 755 /path/to/wp-content/plugins/woostagram-connect/
chown www-data:www-data /path/to/wp-content/plugins/woostagram-connect/

🧯 If You Can't Patch

  • Immediately deactivate and remove the Woostagram Connect plugin from all WordPress installations
  • Implement strict file upload validation at the web server level using mod_security or equivalent

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Woostagram Connect version. If version is 1.0.2 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=woostagram-connect --field=version

Verify Fix Applied:

Verify plugin version is 1.0.3 or later in WordPress admin panel, or confirm plugin is completely removed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/plugins/woostagram-connect/
  • POST requests with .php, .phtml, or other executable file extensions
  • Multiple failed upload attempts followed by successful upload

Network Indicators:

  • HTTP POST requests to Woostagram Connect endpoints with file uploads
  • Unusual outbound connections from web server after file upload

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/woostagram-connect/*" AND http_method="POST" AND content_type="multipart/form-data")

🔗 References

📤 Share & Export