CVE-2024-49624

9.8 CRITICAL

📋 TL;DR

This CVE describes a PHP object injection vulnerability in the Smartdevth Advanced Advertising System WordPress plugin. Attackers can exploit insecure deserialization to execute arbitrary code, potentially compromising affected WordPress sites. All users running versions up to 1.3.1 are vulnerable.

💻 Affected Systems

Products:
  • Smartdevth Advanced Advertising System WordPress Plugin
Versions: n/a through 1.3.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, website defacement, or installation of persistent backdoors.

🟠

Likely Case

Unauthenticated attackers achieving remote code execution to install malware, create admin accounts, or steal sensitive data.

🟢

If Mitigated

Attack blocked at WAF level or plugin disabled, preventing exploitation but potentially breaking functionality.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be targeted via phishing or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack; CVSS 9.8 indicates trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/advanced-advertising-system/wordpress-advanced-advertising-system-plugin-1-3-1-php-object-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Advanced Advertising System'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.3.2+ from WordPress repository and replace files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate advanced-advertising-system

WAF Rule for Deserialization

all

Block requests containing serialized PHP objects in parameters.

Modify WAF to block patterns like O:[0-9]+:"
Block base64 encoded serialized data

🧯 If You Can't Patch

  • Disable the Advanced Advertising System plugin immediately.
  • Implement strict WAF rules to block deserialization attempts and monitor for exploitation.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Advanced Advertising System → Version. If version is 1.3.1 or earlier, system is vulnerable.

Check Version:

wp plugin get advanced-advertising-system --field=version

Verify Fix Applied:

Verify plugin version is 1.3.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php or plugin endpoints
  • PHP errors related to unserialize() or object injection
  • Unexpected file creations in wp-content/uploads

Network Indicators:

  • HTTP requests containing serialized PHP objects (O:8:"stdClass") in parameters
  • Base64 encoded payloads in POST data to plugin endpoints

SIEM Query:

source="wordpress.log" AND ("unserialize" OR "O:" OR "advanced-advertising-system") AND status=200

🔗 References

📤 Share & Export