CVE-2024-5450

9.1 CRITICAL

📋 TL;DR

The Bug Library WordPress plugin before version 2.1.1 has an unrestricted file upload vulnerability that allows unauthenticated attackers to upload PHP files. This can lead to remote code execution on affected WordPress sites. Any WordPress site using the vulnerable plugin version is affected.

💻 Affected Systems

Products:
  • Bug Library WordPress Plugin
Versions: All versions before 2.1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires plugin to be installed and active on WordPress site.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, allowing attackers to install backdoors, steal data, or pivot to other systems.

🟠

Likely Case

Website defacement, malware distribution, or credential theft through uploaded web shells.

🟢

If Mitigated

No impact if file uploads are blocked at web application firewall level or plugin is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with PHP file upload to bug report endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1

Vendor Advisory: https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Bug Library plugin. 4. Click 'Update Now' to version 2.1.1 or later. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Bug Library Plugin

linux

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate bug-library

Block Bug Report Endpoint

linux

Use web application firewall or .htaccess to block access to the vulnerable endpoint.

RewriteEngine On
RewriteRule ^wp-content/plugins/bug-library/.*\.php$ - [F,L]

🧯 If You Can't Patch

  • Remove the Bug Library plugin entirely from the WordPress installation.
  • Implement strict file upload filtering at the web server level to block PHP file uploads.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Bug Library version number.

Check Version:

wp plugin get bug-library --field=version

Verify Fix Applied:

Confirm Bug Library plugin version is 2.1.1 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/bug-library/ with .php file uploads
  • Unusual file creation in plugin upload directories

Network Indicators:

  • POST requests with Content-Type: multipart/form-data to bug library endpoints
  • File uploads with .php extensions to plugin paths

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/bug-library/" AND method="POST" AND file_extension="php")

🔗 References

📤 Share & Export