CVE-2024-7258
📋 TL;DR
The WooCommerce Google Feed Manager WordPress plugin has a vulnerability that allows authenticated users with Contributor-level access or higher to delete arbitrary files on the server. This can lead to remote code execution if critical files like wp-config.php are deleted. All WordPress sites using this plugin up to version 2.8.0 are affected.
💻 Affected Systems
- WooCommerce Google Feed Manager (WP Product Feed Manager)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site compromise via remote code execution leading to data theft, defacement, or malware installation.
Likely Case
Site disruption or data loss from deletion of important files, potentially requiring restoration from backups.
If Mitigated
Minimal impact if proper access controls and file permissions are in place.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.1
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3137475/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Google Feed Manager' and click 'Update Now'. 4. Verify version is 2.8.1 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate wp-product-feed-manager
Restrict User Roles
allRemove Contributor and higher roles from untrusted users.
🧯 If You Can't Patch
- Implement strict file permissions (e.g., 644 for files, 755 for directories) to limit deletion capabilities.
- Monitor and audit file deletion activities, especially from authenticated users.
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins.
Check Version:
wp plugin get wp-product-feed-manager --field=version
Verify Fix Applied:
Confirm plugin version is 2.8.1 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual file deletion events in WordPress or web server logs
- AJAX requests to wppfm_removeFeedFile function
Network Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=wppfm_removeFeedFile
SIEM Query:
source="wordpress.log" AND "wppfm_removeFeedFile"
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-product-feed-manager/trunk/includes/data/js/wppfm_ajaxdatahandling.js#L537
- https://plugins.trac.wordpress.org/browser/wp-product-feed-manager/trunk/includes/data/js/wppfm_ajaxdatahandling.js#L546
- https://plugins.trac.wordpress.org/browser/wp-product-feed-manager/trunk/includes/data/js/wppfm_ajaxdatahandling.js#L575
- https://plugins.trac.wordpress.org/changeset/3137475/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ffd6e18d-9173-4911-af64-5d54c6d2e052?source=cve