CVE-2024-50526

10.0 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, to WordPress servers running the vulnerable Multi Purpose Mail Form plugin. Attackers can achieve remote code execution and full server compromise. All WordPress sites using versions 1.0.2 or earlier of this plugin are affected.

💻 Affected Systems

Products:
  • WordPress Multi Purpose Mail Form plugin
Versions: n/a through 1.0.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining full administrative access, data exfiltration, ransomware deployment, and use as pivot point for lateral movement.

🟠

Likely Case

Web shell upload leading to website defacement, data theft, cryptocurrency mining, or participation in botnets.

🟢

If Mitigated

File upload attempts blocked at WAF level with no successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists and requires no authentication. Attack is trivial to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/multi-purpose-mail-form/wordpress-multi-purpose-mail-form-plugin-1-0-2-arbitrary-file-upload-vulnerability-2?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Multi Purpose Mail Form'. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable plugin via wp-cli

linux

Deactivate the vulnerable plugin using WordPress command-line interface

wp plugin deactivate multi-purpose-mail-form

Delete plugin files

linux

Remove plugin files from server filesystem

rm -rf /path/to/wordpress/wp-content/plugins/multi-purpose-mail-form/

🧯 If You Can't Patch

  • Immediately deactivate and remove the Multi Purpose Mail Form plugin from all WordPress installations
  • Implement WAF rules to block file uploads to the affected plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Multi Purpose Mail Form' version 1.0.2 or earlier

Check Version:

wp plugin get multi-purpose-mail-form --field=version

Verify Fix Applied:

Verify plugin version is 1.0.3 or later, or confirm plugin is not installed

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-content/plugins/multi-purpose-mail-form/upload.php with file uploads
  • Unauthorized file creation in upload directories
  • Web shell file names like shell.php, cmd.php, backdoor.php

Network Indicators:

  • Unusual outbound connections from web server
  • POST requests with PHP file uploads to plugin endpoints

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/multi-purpose-mail-form/upload.php" OR file_name="*.php") AND http_method="POST"

🔗 References

📤 Share & Export