CVE-2024-56064

10.0 CRITICAL

📋 TL;DR

CVE-2024-56064 is an unauthenticated arbitrary file upload vulnerability in the WP SuperBackup WordPress plugin. Attackers can upload malicious files like web shells to vulnerable servers without authentication. This affects all WP SuperBackup installations from unknown versions through 2.3.3.

💻 Affected Systems

Products:
  • WP SuperBackup WordPress plugin
Versions: n/a through 2.3.3
Operating Systems: All OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, website defacement, and use as attack platform.

🟠

Likely Case

Web shell installation enabling persistent backdoor access, data exfiltration, and further lateral movement.

🟢

If Mitigated

File upload blocked or sanitized, preventing malicious file execution.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows direct internet attacks.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if plugin accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with malicious file payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/indeed-wp-superbackup/vulnerability/wordpress-wp-superbackup-plugin-2-3-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update WP SuperBackup plugin to version 2.3.4 or later via WordPress admin panel. 2. Verify update completed successfully. 3. Remove any suspicious files uploaded during vulnerability window.

🔧 Temporary Workarounds

Disable WP SuperBackup plugin

all

Temporarily disable vulnerable plugin until patched.

wp plugin deactivate indeed-wp-superbackup

Restrict file uploads via web server

linux

Block file uploads to WP SuperBackup endpoint.

# Add to .htaccess for Apache: RewriteRule ^wp-content/plugins/indeed-wp-superbackup/.*\.php$ - [F,L]
# Add to nginx config: location ~ ^/wp-content/plugins/indeed-wp-superbackup/.*\.php$ { deny all; }

🧯 If You Can't Patch

  • Disable WP SuperBackup plugin immediately
  • Implement web application firewall rules blocking file uploads to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for WP SuperBackup plugin version 2.3.3 or earlier.

Check Version:

wp plugin list --name=indeed-wp-superbackup --field=version

Verify Fix Applied:

Confirm WP SuperBackup plugin version is 2.3.4 or later in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-content/plugins/indeed-wp-superbackup/ upload endpoints
  • File creation in plugin directories with .php extensions

Network Indicators:

  • Unusual outbound connections from web server post-file upload

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/indeed-wp-superbackup/*" AND http_method="POST")

🔗 References

📤 Share & Export