CVE-2024-56249

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress sites using the WPMasterToolKit plugin. Attackers can gain full control of affected web servers. All WordPress installations with WPMasterToolkit versions up to 1.13.1 are vulnerable.

💻 Affected Systems

Products:
  • Webdeclic WPMasterToolKit WordPress Plugin
Versions: All versions up to and including 1.13.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the WPMasterToolKit plugin to be installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as part of a botnet.

🟠

Likely Case

Web shell upload enabling persistent backdoor access, data exfiltration, and further lateral movement.

🟢

If Mitigated

File uploads blocked or properly validated, preventing malicious file execution.

🌐 Internet-Facing: HIGH - Web applications are directly accessible from the internet.
🏢 Internal Only: MEDIUM - Internal applications could still be exploited by compromised internal users.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.13.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wpmastertoolkit/vulnerability/wordpress-wpmastertoolkit-plugin-1-13-1-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WPMasterToolKit and update to version 1.13.2 or later. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable WPMasterToolKit Plugin

all

Temporarily deactivate the vulnerable plugin until patching is possible.

wp plugin deactivate wpmastertoolkit

Restrict File Uploads via Web Server

linux

Configure web server to block uploads of executable file types to the plugin's upload directory.

# In Apache .htaccess: <FilesMatch "\.(php|phtml|php3|php4|php5|pl|py|jsp|asp|sh|cgi)$">
  Order allow,deny
  Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove WPMasterToolKit plugin completely from the WordPress installation.
  • Implement strict file upload validation at the application level and monitor upload directories for suspicious files.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WPMasterToolKit version 1.13.1 or earlier.

Check Version:

wp plugin get wpmastertoolkit --field=version

Verify Fix Applied:

Confirm WPMasterToolKit version is 1.13.2 or later in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads/wpmastertoolkit/ directory
  • POST requests to plugin-specific upload endpoints with executable file extensions

Network Indicators:

  • HTTP POST requests with file uploads to WPMasterToolKit endpoints
  • Unexpected outbound connections from web server post-upload

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/wpmastertoolkit/*" AND method="POST" AND file_extension IN ("php", "phtml", "jsp", "asp"))

🔗 References

📤 Share & Export