CVE-2024-7384
📋 TL;DR
The AcyMailing WordPress plugin has a vulnerability that allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation. This can lead to remote code execution on affected WordPress sites. All WordPress sites using AcyMailing versions up to 9.7.2 are vulnerable.
💻 Affected Systems
- AcyMailing WordPress Plugin
📦 What is this software?
Acymailing by Acymailing
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full server control through remote code execution, leading to data theft, site defacement, malware distribution, or complete system compromise.
Likely Case
Attackers upload web shells or malicious scripts to execute arbitrary commands, potentially gaining administrative access to the WordPress site and server.
If Mitigated
With proper file upload restrictions and web application firewalls, attackers may only be able to upload benign files without achieving code execution.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained. The vulnerability is in a core file extraction function.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.7.3 and later
Vendor Advisory: https://www.acymailing.com/changelog/
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find AcyMailing plugin
4. Click 'Update Now' if available
5. Alternatively, download version 9.7.3+ from WordPress.org and manually update
🔧 Temporary Workarounds
Restrict File Uploads via .htaccess
linuxBlock execution of uploaded files in upload directories
Add to .htaccess in wp-content/uploads/acymailing/: <FilesMatch "\.(php|php5|php7|phtml|phar)$">
Order Allow,Deny
Deny from all
</FilesMatch>
Disable AcyMailing Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate acymailing
🧯 If You Can't Patch
- Remove Subscriber and higher role access from untrusted users
- Implement web application firewall rules to block suspicious file upload patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → AcyMailing version. If version is 9.7.2 or lower, you are vulnerable.
Check Version:
wp plugin get acymailing --field=version
Verify Fix Applied:
Confirm AcyMailing version is 9.7.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/acymailing/
- POST requests to acym_extractArchive function
- Multiple failed upload attempts from single user
Network Indicators:
- HTTP POST requests with file uploads to AcyMailing endpoints
- Unusual outbound connections from WordPress server after file uploads
SIEM Query:
source="wordpress.log" AND ("acymailing" AND "upload") OR ("acym_extractArchive")
🔗 References
- https://plugins.trac.wordpress.org/browser/acymailing/trunk/back/libraries/wordpress/file.php#L47
- https://plugins.trac.wordpress.org/changeset/3137644/
- https://plugins.trac.wordpress.org/changeset?old_path=%2Facymailing&old=3118953&new_path=%2Facymailing&new=3137644&sfp_email=&sfph_mail=
- https://wordpress.org/plugins/acymailing/#developers
- https://www.acymailing.com/changelog/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0c747bc9-582c-4b9f-85a4-469c446d50f5?source=cve