CVE-2024-5489
📋 TL;DR
The Wbcom Designs Custom Font Uploader WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to delete any custom font. This affects all WordPress sites using plugin versions up to 2.3.4. The vulnerability stems from a missing capability check in the font deletion function.
💻 Affected Systems
- Wbcom Designs Custom Font Uploader WordPress Plugin
📦 What is this software?
Custom Font Uploader by Wbcomdesigns
⚠️ Risk & Real-World Impact
Worst Case
Malicious authenticated users could delete all custom fonts, disrupting website typography and branding, potentially causing site functionality issues if fonts are critical to design.
Likely Case
Low-privilege users deleting fonts they shouldn't have access to, causing minor design disruptions that require administrator intervention to restore.
If Mitigated
No impact if proper user role management and access controls are implemented, or if the vulnerability is patched.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple - just calling the vulnerable function without proper authorization checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.3.5
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3097373/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Custom Font Uploader'
4. Click 'Update Now' if update is available
5. Alternatively, download version 2.3.5+ from WordPress plugin repository
6. Deactivate, delete old version, upload and activate new version
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate custom-font-uploader
Remove Subscriber Delete Capability
allUse a role management plugin to remove font deletion capabilities from low-privilege roles
🧯 If You Can't Patch
- Disable the Custom Font Uploader plugin entirely
- Implement strict user role management and monitor for suspicious font deletion activities
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Custom Font Uploader → Version. If version is 2.3.4 or lower, you are vulnerable.
Check Version:
wp plugin get custom-font-uploader --field=version
Verify Fix Applied:
After updating, verify plugin version shows 2.3.5 or higher in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- WordPress audit logs showing font deletion by non-administrator users
- Plugin-specific logs showing font removal actions
Network Indicators:
- POST requests to WordPress admin-ajax.php or admin-post.php with font deletion parameters
SIEM Query:
source="wordpress" AND (action="delete_font" OR plugin="custom-font-uploader") AND user_role!="administrator"
🔗 References
- https://plugins.trac.wordpress.org/browser/custom-font-uploader/trunk/inc/cfup-functions.php#L20
- https://plugins.trac.wordpress.org/changeset/3097373/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2339ebbf-2302-4e83-9743-ca79fda20f05?source=cve
- https://plugins.trac.wordpress.org/browser/custom-font-uploader/trunk/inc/cfup-functions.php#L20
- https://plugins.trac.wordpress.org/changeset/3097373/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2339ebbf-2302-4e83-9743-ca79fda20f05?source=cve