CVE-2024-52408

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress sites running the vulnerable PushAssist plugin. Attackers can gain full control of affected websites, potentially leading to data theft, defacement, or further network compromise. All WordPress sites using PushAssist Push Notifications plugin versions up to 3.0.8 are affected.

💻 Affected Systems

Products:
  • Push Notifications for WordPress by PushAssist
Versions: n/a through 3.0.8
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin enabled are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data exfiltration, ransomware deployment, or use as pivot point for internal network attacks.

🟠

Likely Case

Website defacement, credential theft, malware distribution, or cryptocurrency mining bot installation.

🟢

If Mitigated

Limited to plugin directory access only, preventing full server compromise but still allowing website manipulation.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be compromised via phishing or internal attackers.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and can be automated with simple scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.9 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/push-notification-for-wp-by-pushassist/wordpress-push-notifications-for-wordpress-by-pushassist-plugin-3-0-8-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Push Notifications for WordPress by PushAssist'. 4. Click 'Update Now' if available. 5. If no update appears, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation.

wp plugin deactivate push-notification-for-wp-by-pushassist

File Upload Restriction

all

Add web server rules to block uploads to the plugin directory.

# Apache: Add to .htaccess in wp-content/plugins/push-notification-for-wp-by-pushassist/
<FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|aspx|cgi|sh|bash)">
    Order Allow,Deny
    Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~* ^/wp-content/plugins/push-notification-for-wp-by-pushassist/.*\.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|aspx|cgi|sh|bash)$ {
    deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate and remove the PushAssist plugin from all WordPress installations.
  • Implement web application firewall (WAF) rules to block file uploads to the plugin directory.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Push Notifications for WordPress by PushAssist' version 3.0.8 or earlier.

Check Version:

wp plugin get push-notification-for-wp-by-pushassist --field=version

Verify Fix Applied:

Verify plugin version is 3.0.9 or later, or confirm plugin is not installed/active.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-content/plugins/push-notification-for-wp-by-pushassist/
  • File uploads with .php, .phtml, or other executable extensions to plugin directory
  • New files created in wp-content/plugins/push-notification-for-wp-by-pushassist/ with suspicious names

Network Indicators:

  • HTTP POST requests to plugin upload endpoints from unexpected sources
  • Outbound connections from WordPress server to unknown IPs after file upload

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/push-notification-for-wp-by-pushassist/*" AND http_method="POST")

🔗 References

📤 Share & Export