CVE-2024-52406

9.9 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, to WordPress servers running the CSV to html plugin. Attackers can achieve remote code execution and full server compromise. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • WordPress CSV to html plugin
Versions: n/a through 3.04
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: WordPress multisite installations may be particularly vulnerable due to shared file upload directories.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining persistent access, data exfiltration, ransomware deployment, and using the server as a pivot point to attack internal networks.

🟠

Likely Case

Web shell upload leading to website defacement, data theft, cryptocurrency mining, or participation in botnets.

🟢

If Mitigated

File upload attempts blocked at web application firewall level, preventing exploitation but potentially causing service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and can be automated with simple scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.05 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/csv-to-html/wordpress-csv-to-html-plugin-3-04-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'CSV to html' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable plugin

all

Deactivate and delete the vulnerable plugin

wp plugin deactivate csv-to-html
wp plugin delete csv-to-html

Web Application Firewall rule

all

Block file upload requests to CSV to html endpoints

🧯 If You Can't Patch

  • Immediately deactivate and remove the CSV to html plugin from all WordPress installations
  • Implement strict file upload restrictions at web server level and monitor upload directories for suspicious files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for CSV to html plugin version 3.04 or earlier

Check Version:

wp plugin get csv-to-html --field=version

Verify Fix Applied:

Verify plugin version is 3.05 or later, or confirm plugin is not installed

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-content/plugins/csv-to-html/upload.php with file upload parameters
  • Unexpected PHP files in upload directories
  • Web shell access patterns in access logs

Network Indicators:

  • File uploads to CSV to html endpoints from unexpected sources
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/csv-to-html/upload.php" OR file_extension="php" IN upload_dir)

🔗 References

📤 Share & Export