CVE-2024-49330

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, to WordPress servers running the Nice Backgrounds plugin. Attackers can achieve remote code execution and full server compromise. All WordPress sites using Nice Backgrounds version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Nice Backgrounds Plugin
Versions: 1.0 and earlier
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the vulnerable plugin version are affected regardless of WordPress configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with persistent backdoor installation, data exfiltration, and lateral movement to other systems.

🟠

Likely Case

Web shell upload leading to website defacement, credential theft, and cryptocurrency mining malware deployment.

🟢

If Mitigated

File upload attempts blocked at web application firewall level with no successful exploitation.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Internal WordPress sites could be compromised for lateral movement within networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with malicious file upload to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://patchstack.com/database/vulnerability/nicebackgrounds/wordpress-nice-backgrounds-plugin-1-0-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Immediately remove the Nice Backgrounds plugin from all WordPress installations. 2. Delete all plugin files from the wp-content/plugins/nicebackgrounds directory. 3. Search for and remove any suspicious files uploaded via this vulnerability.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block file uploads to the vulnerable plugin endpoint

Block HTTP POST requests to /wp-content/plugins/nicebackgrounds/*

File System Permissions Restriction

linux

Remove write permissions from plugin upload directory

chmod -R 755 /var/www/html/wp-content/plugins/nicebackgrounds/
chown -R root:root /var/www/html/wp-content/plugins/nicebackgrounds/

🧯 If You Can't Patch

  • Disable or remove the Nice Backgrounds plugin immediately
  • Implement strict file upload validation at the web server level

🔍 How to Verify

Check if Vulnerable:

Check if /wp-content/plugins/nicebackgrounds/ directory exists and contains version 1.0 files

Check Version:

grep -r "Version:" /path/to/wordpress/wp-content/plugins/nicebackgrounds/*.php

Verify Fix Applied:

Confirm the nicebackgrounds directory has been completely removed from wp-content/plugins/

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/nicebackgrounds/upload.php with file uploads
  • Unusual file creations in plugin directories with .php, .phtml, or .jsp extensions

Network Indicators:

  • Unusual outbound connections from web server to unknown IPs
  • Large file uploads to plugin endpoints

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/nicebackgrounds/*" AND http_method="POST" AND content_type="multipart/form-data")

🔗 References

📤 Share & Export