CVE-2024-52429
📋 TL;DR
This vulnerability in the WP Quick Setup WordPress plugin allows attackers to upload arbitrary files, including web shells, to the server. It affects all versions up to 2.0, enabling remote code execution on vulnerable WordPress sites.
💻 Affected Systems
- WP Quick Setup WordPress Plugin
📦 What is this software?
Wp Quick Setup by Antonhoelstad
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, defacement, malware distribution, or use as part of a botnet.
Likely Case
Web shell installation allowing persistent backdoor access, file manipulation, and further exploitation of the WordPress environment.
If Mitigated
Limited impact if file uploads are restricted at web server level or security plugins block malicious uploads.
🎯 Exploit Status
Exploitation is straightforward - attackers can upload malicious files directly via plugin functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.1
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Quick Setup and update to version 2.0.1 or later. 4. If update not available, deactivate and delete the plugin immediately.
🔧 Temporary Workarounds
Disable Plugin
allDeactivate and remove the vulnerable plugin
wp plugin deactivate wp-quick-setup
wp plugin delete wp-quick-setup
Restrict File Uploads
linuxConfigure web server to block PHP file uploads to upload directories
# Add to .htaccess in uploads directory:
<Files *.php>
Order Deny,Allow
Deny from all
</Files>
🧯 If You Can't Patch
- Immediately deactivate and remove the WP Quick Setup plugin from all WordPress installations.
- Implement web application firewall rules to block file upload attempts to the plugin's endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for WP Quick Setup version 2.0 or earlier.
Check Version:
wp plugin get wp-quick-setup --field=version
Verify Fix Applied:
Verify plugin version is 2.0.1 or later, or confirm plugin is not installed.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/plugins/wp-quick-setup/ directories
- POST requests to plugin-specific endpoints with file upload parameters
Network Indicators:
- HTTP POST requests containing file uploads to wp-quick-setup plugin paths
SIEM Query:
source="web_server" AND (uri_path="/wp-content/plugins/wp-quick-setup/*" AND method="POST" AND (request_body CONTAINS "Content-Disposition: form-data" OR request_body CONTAINS "multipart/form-data"))