CVE-2024-7415

5.3 MEDIUM

📋 TL;DR

The Remember Me Controls WordPress plugin up to version 2.0.1 allows unauthenticated attackers to retrieve the full server path via direct access to bootstrap.php with display_errors enabled. This information disclosure vulnerability affects all WordPress sites using vulnerable plugin versions. While not directly damaging, the exposed path information can assist attackers in exploiting other vulnerabilities.

💻 Affected Systems

Products:
  • WordPress Remember Me Controls plugin
Versions: All versions up to and including 2.0.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. The vulnerability exists in the plugin's test file that should not be publicly accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine path disclosure with other vulnerabilities (like file inclusion or directory traversal) to achieve remote code execution, data theft, or complete system compromise.

🟠

Likely Case

Attackers gather reconnaissance information about server structure to plan more sophisticated attacks against the WordPress installation.

🟢

If Mitigated

Minimal impact as path disclosure alone doesn't compromise systems, though it still provides attackers with useful reconnaissance data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP request to the vulnerable file. The vulnerability is publicly documented with proof-of-concept available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3146603%40remember-me-controls&new=3146603%40remember-me-controls&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Remember Me Controls' and click 'Update Now' if available. 4. Alternatively, download version 2.0.2+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable file

linux

Delete or restrict access to the vulnerable bootstrap.php file in the plugin's test directory

rm -rf /path/to/wp-content/plugins/remember-me-controls/tests/

Block access via .htaccess

all

Prevent direct access to the vulnerable file using web server configuration

<Files "bootstrap.php">
  Order Allow,Deny
  Deny from all
</Files>

🧯 If You Can't Patch

  • Deactivate the Remember Me Controls plugin completely until patched
  • Implement web application firewall rules to block requests to /tests/ directory paths

🔍 How to Verify

Check if Vulnerable:

Access https://yoursite.com/wp-content/plugins/remember-me-controls/tests/phpunit/bootstrap.php - if it returns server path information, the site is vulnerable.

Check Version:

Check WordPress admin plugins page or examine /wp-content/plugins/remember-me-controls/readme.txt version number

Verify Fix Applied:

Attempt the same access after patching - should return 403/404 error or blank page without path disclosure.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to /wp-content/plugins/remember-me-controls/tests/phpunit/bootstrap.php
  • Unusual requests to plugin test directories

Network Indicators:

  • GET requests to bootstrap.php file paths from external IPs

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/remember-me-controls/tests/phpunit/bootstrap.php" AND status=200

🔗 References

📤 Share & Export