CVE-2024-7410

5.3 MEDIUM

📋 TL;DR

The My Custom CSS PHP & ADS WordPress plugin discloses the full server path to unauthenticated attackers through direct access to a specific file. This information alone doesn't cause damage but can help attackers map the server structure for subsequent attacks. All WordPress sites using this plugin up to version 3.3 are affected.

💻 Affected Systems

Products:
  • My Custom CSS PHP & ADS WordPress Plugin
Versions: All versions up to and including 3.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. The vulnerability exists regardless of plugin configuration settings.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine path disclosure with other vulnerabilities (like file inclusion or directory traversal) to execute arbitrary code, access sensitive files, or compromise the server.

🟠

Likely Case

Attackers gather reconnaissance information about server structure to plan more targeted attacks against the WordPress installation.

🟢

If Mitigated

Minimal impact since path disclosure alone doesn't enable direct compromise, though it still provides attackers with useful reconnaissance data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a web browser or curl command to access the vulnerable file path. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/my-custom-css/trunk/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php

Restart Required: No

Instructions:

1. Update the My Custom CSS PHP & ADS plugin to version 3.4 or later via WordPress admin dashboard. 2. Verify the update completed successfully. 3. Clear any caching mechanisms if present.

🔧 Temporary Workarounds

Block direct access to vulnerable file

all

Add .htaccess rule to prevent direct access to the vulnerable PHP file

# Add to .htaccess in WordPress root directory
<Files "exportToJSON.php">
    Order Allow,Deny
    Deny from all
</Files>

Remove vulnerable file

linux

Delete the vulnerable file from the server

rm -f /path/to/wordpress/wp-content/plugins/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php

🧯 If You Can't Patch

  • Disable or remove the My Custom CSS PHP & ADS plugin entirely from WordPress
  • Implement web application firewall rules to block requests to the vulnerable file path

🔍 How to Verify

Check if Vulnerable:

Access https://your-site.com/wp-content/plugins/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php in a browser. If it returns server path information instead of a 403/404 error, the site is vulnerable.

Check Version:

Check WordPress admin dashboard > Plugins > My Custom CSS PHP & ADS, or examine the plugin's readme.txt file version number.

Verify Fix Applied:

Attempt to access the same URL after patching. It should return a 403 error or be inaccessible.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /wp-content/plugins/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php
  • Unusual number of requests to plugin directories from single IPs

Network Indicators:

  • HTTP requests to the vulnerable file path returning 200 OK status with path disclosure content

SIEM Query:

source="web_server_logs" AND uri="/wp-content/plugins/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php" AND status=200

🔗 References

📤 Share & Export