CVE-2024-5450
📋 TL;DR
The Bug Library WordPress plugin before version 2.1.1 has an unrestricted file upload vulnerability that allows unauthenticated attackers to upload PHP files. This can lead to remote code execution on affected WordPress sites. Any WordPress site using the vulnerable plugin version is affected.
💻 Affected Systems
- Bug Library WordPress Plugin
📦 What is this software?
Bug Library by Bug Library Project
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution, allowing attackers to install backdoors, steal data, or pivot to other systems.
Likely Case
Website defacement, malware distribution, or credential theft through uploaded web shells.
If Mitigated
No impact if file uploads are blocked at web application firewall level or plugin is disabled.
🎯 Exploit Status
Simple HTTP POST request with PHP file upload to bug report endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.1
Vendor Advisory: https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Bug Library plugin. 4. Click 'Update Now' to version 2.1.1 or later. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable Bug Library Plugin
linuxTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate bug-library
Block Bug Report Endpoint
linuxUse web application firewall or .htaccess to block access to the vulnerable endpoint.
RewriteEngine On
RewriteRule ^wp-content/plugins/bug-library/.*\.php$ - [F,L]
🧯 If You Can't Patch
- Remove the Bug Library plugin entirely from the WordPress installation.
- Implement strict file upload filtering at the web server level to block PHP file uploads.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Bug Library version number.
Check Version:
wp plugin get bug-library --field=version
Verify Fix Applied:
Confirm Bug Library plugin version is 2.1.1 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-content/plugins/bug-library/ with .php file uploads
- Unusual file creation in plugin upload directories
Network Indicators:
- POST requests with Content-Type: multipart/form-data to bug library endpoints
- File uploads with .php extensions to plugin paths
SIEM Query:
source="web_server" AND (uri_path="/wp-content/plugins/bug-library/" AND method="POST" AND file_extension="php")