CVE-2024-49657

7.7 HIGH

📋 TL;DR

CVE-2024-49657 is a missing authorization vulnerability in the ReneeCussack 3D Work In Progress WordPress plugin that allows attackers to delete arbitrary files without proper authentication. This affects all WordPress sites running the plugin versions up to 1.0.3. Attackers can exploit this to delete critical files, potentially causing service disruption or complete site compromise.

💻 Affected Systems

Products:
  • ReneeCussack 3D Work In Progress WordPress Plugin
Versions: n/a through 1.0.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through deletion of WordPress core files, configuration files, or database files, leading to permanent data loss and extended downtime.

🟠

Likely Case

Attackers delete theme files, plugin files, or uploaded content, causing site functionality issues and requiring restoration from backups.

🟢

If Mitigated

With proper file permissions and web application firewalls, exploitation attempts are blocked, limiting impact to minor disruptions.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and this vulnerability requires no authentication, making all affected sites immediately vulnerable to external attacks.
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit this, but the primary risk comes from external threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with publicly available proof-of-concept code, requiring only HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/renee-work-in-progress/wordpress-3d-work-in-progress-plugin-1-0-3-arbitrary-file-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find '3D Work In Progress' plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 1.0.4+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable or Remove Plugin

all

Temporarily disable or completely remove the vulnerable plugin until patched.

wp plugin deactivate renee-work-in-progress
wp plugin delete renee-work-in-progress

Web Application Firewall Rule

all

Block requests to vulnerable plugin endpoints using WAF rules.

Block HTTP requests containing '/wp-content/plugins/renee-work-in-progress/' in URL path

🧯 If You Can't Patch

  • Immediately disable the 3D Work In Progress plugin via WordPress admin or command line.
  • Implement strict file permissions (644 for files, 755 for directories) and monitor for unauthorized file deletion attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for '3D Work In Progress' version 1.0.3 or earlier.

Check Version:

wp plugin get renee-work-in-progress --field=version

Verify Fix Applied:

Verify plugin version is 1.0.4 or later in WordPress admin, or check plugin header in /wp-content/plugins/renee-work-in-progress/renee-work-in-progress.php.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200/403 responses to POST requests containing file deletion parameters
  • Unusual file deletion events in WordPress or web server logs
  • Requests to /wp-content/plugins/renee-work-in-progress/ with delete parameters

Network Indicators:

  • POST requests to plugin endpoints with file path parameters
  • Unusual outbound traffic patterns after file deletion

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/renee-work-in-progress/" AND (method="POST" OR parameters CONTAINS "delete" OR parameters CONTAINS "file="))

🔗 References

📤 Share & Export