CVE-2024-52384

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files (like web shells) to WordPress servers running the Sage AI plugin. It affects all WordPress sites using Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation plugin versions up to 2.4.9. Successful exploitation gives attackers remote code execution capabilities.

💻 Affected Systems

Products:
  • Sage AI: Chatbots, OpenAI GPT-4 Bulk Articles, Dalle-3 Image Generation WordPress plugin
Versions: n/a through 2.4.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as part of a botnet.

🟠

Likely Case

Web shell installation allowing persistent backdoor access, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

File uploads blocked or sanitized, preventing malicious file execution while maintaining plugin functionality.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Internal WordPress instances could still be targeted via phishing or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

File upload vulnerabilities are commonly exploited and weaponized quickly. The Patchstack reference suggests exploit details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.4.9

Vendor Advisory: https://patchstack.com/database/vulnerability/ai-content-generator/wordpress-sage-ai-chatbots-openai-gpt-4-bulk-articles-dalle-3-image-generation-plugin-2-4-9-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update the Sage AI plugin to the latest version via WordPress admin panel. 2. Verify the update completed successfully. 3. Check for any unauthorized files in upload directories.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable the plugin's file upload features until patched.

Edit plugin files to comment out upload handlers or use WordPress hooks to disable upload functionality

Web server file type restrictions

linux

Configure web server to block execution of uploaded PHP and other script files.

For Apache: Add 'php_flag engine off' to .htaccess in upload directories
For Nginx: Add 'location ~ \.php$ { deny all; }' to upload directory config

🧯 If You Can't Patch

  • Disable or remove the Sage AI plugin entirely
  • Implement strict file upload validation at the application or WAF level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Sage AI plugin version. If version is 2.4.9 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Sage AI' --field=version (if WP-CLI installed) or check WordPress admin panel

Verify Fix Applied:

Verify plugin version is above 2.4.9 and test file upload functionality with malicious file extensions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to WordPress upload directories
  • POST requests to plugin-specific upload endpoints with executable file extensions
  • Web server errors related to file execution in upload directories

Network Indicators:

  • HTTP POST requests with file uploads to /wp-content/plugins/ai-content-generator/ endpoints
  • Subsequent requests to uploaded files with .php, .phtml, or other executable extensions

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/ai-content-generator/*" AND method="POST" AND content_type="multipart/form-data") OR (uri_path="/wp-content/uploads/*.php" AND method IN ("GET", "POST"))

🔗 References

📤 Share & Export