CVE-2024-5080

8.8 HIGH

📋 TL;DR

This vulnerability in the wp-eMember WordPress plugin allows administrators to upload arbitrary files without validation, including malicious PHP files. Attackers with admin access could upload webshells or backdoors to gain remote code execution. Only WordPress sites using vulnerable versions of the wp-eMember plugin are affected.

💻 Affected Systems

Products:
  • wp-eMember WordPress Plugin
Versions: All versions before 10.6.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. WordPress multisite installations may have different impact.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized file upload leading to webshell deployment, site defacement, or malware distribution.

🟢

If Mitigated

Limited impact with proper file upload restrictions and admin account security.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials. Attack chain could involve credential theft or social engineering first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.6.6

Vendor Advisory: https://wpscan.com/vulnerability/15f78aad-001c-4219-aa7e-46537e1357a2/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find wp-eMember plugin. 4. Click 'Update Now' if available. 5. If manual update needed, download version 10.6.6 from WordPress repository. 6. Deactivate plugin. 7. Replace plugin files via FTP/SFTP. 8. Reactivate plugin.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure web server to block PHP file uploads in wp-content/uploads directory

# Apache: Add to .htaccess in uploads directory
<Files *.php>
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~* /wp-content/uploads/.*\.php$ {
    deny all;
}

Disable Plugin

linux

Temporarily disable wp-eMember plugin until patched

wp plugin deactivate wp-eMember

🧯 If You Can't Patch

  • Implement strict admin account security with MFA and strong passwords
  • Deploy WAF rules to block suspicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check wp-eMember plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin list --name=wp-eMember --field=version

Verify Fix Applied:

Confirm plugin version is 10.6.6 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads via admin users
  • POST requests to wp-admin/admin-ajax.php with file upload parameters
  • PHP file creation in uploads directory

Network Indicators:

  • HTTP POST requests with multipart/form-data containing PHP files
  • Unusual admin authentication patterns followed by file uploads

SIEM Query:

source="web_logs" (uri_path="/wp-admin/admin-ajax.php" OR uri_path="/wp-content/uploads/*") http_method=POST file_extension="php"

🔗 References

📤 Share & Export