CVE-2024-54367

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code through PHP object injection by exploiting unsafe deserialization in ForumWP WordPress plugin. All WordPress sites running ForumWP versions up to 2.1.0 are affected. Attackers can gain full control of vulnerable websites.

💻 Affected Systems

Products:
  • ForumWP WordPress Plugin
Versions: All versions up to and including 2.1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ForumWP plugin active. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, malware deployment, credential harvesting, and website defacement.

🟠

Likely Case

Remote code execution allowing attackers to create admin users, install backdoors, or exfiltrate sensitive data.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though deserialization vulnerabilities remain dangerous.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. Public exploit details available on security research sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/forumwp/vulnerability/wordpress-forumwp-plugin-2-1-0-php-object-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ForumWP and click 'Update Now'. 4. Verify version is 2.1.1 or higher.

🔧 Temporary Workarounds

Disable ForumWP Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate forumwp

Restrict Plugin Access

all

Use web application firewall to block requests to ForumWP endpoints

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs
  • Deploy web application firewall with deserialization attack detection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → ForumWP version. If version is 2.1.0 or lower, you are vulnerable.

Check Version:

wp plugin get forumwp --field=version

Verify Fix Applied:

After update, confirm ForumWP version shows 2.1.1 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ForumWP endpoints
  • PHP error logs containing unserialize() warnings
  • Unexpected file creation in wp-content/uploads

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters
  • Traffic to known malicious IPs from WordPress server

SIEM Query:

source="apache_access" OR source="nginx_access" AND (uri="*forumwp*" AND (method="POST" OR method="PUT")) AND size>1000

🔗 References

📤 Share & Export