CVE-2024-50529

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress servers running the Rudra Innovative Software Training – Courses plugin. Attackers can gain full control of affected websites. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WordPress Training – Courses plugin by Rudra Innovative Software
Versions: n/a through 2.0.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as part of a botnet.

🟠

Likely Case

Website defacement, data exfiltration, and installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if file uploads are restricted at web server level or WAF blocks malicious uploads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with malicious file upload can exploit this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/training/wordpress-training-courses-plugin-2-0-1-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'Training – Courses' plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and delete plugin immediately

🔧 Temporary Workarounds

Disable plugin

all

Deactivate and remove vulnerable plugin

wp plugin deactivate training
wp plugin delete training

Restrict file uploads via .htaccess

linux

Block PHP file uploads to plugin directories

<FilesMatch "\.(php|php5|php7|phtml|phar)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Immediately deactivate and remove the Training – Courses plugin from all WordPress installations.
  • Implement web application firewall (WAF) rules to block file uploads to the affected plugin endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Training – Courses for version 2.0.1 or earlier.

Check Version:

wp plugin get training --field=version

Verify Fix Applied:

Verify plugin version is 2.0.2 or later, or confirm plugin is completely removed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/training/ upload endpoints
  • Unusual file uploads with .php, .phtml, or other executable extensions
  • Files created in plugin directories with suspicious names

Network Indicators:

  • POST requests to training plugin upload endpoints with file attachments
  • Unusual outbound connections from web server after file upload

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/training/*" AND method="POST") AND (file_extension="php" OR file_extension="phtml" OR file_extension="phar")

🔗 References

📤 Share & Export