CVE-2024-7770
📋 TL;DR
This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation in the Bit File Manager plugin. Attackers can potentially achieve remote code execution by uploading malicious files like PHP shells. All WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Bit File Manager - WordPress File Manager and Code Editor
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data theft, defacement, malware distribution, or ransomware deployment.
Likely Case
Unauthorized file upload leading to webshell installation and limited server access.
If Mitigated
File upload attempts logged and blocked, no successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once an account is compromised.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.5.6 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3138710/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Bit File Manager' and click 'Update Now'. 4. Verify version is 6.5.6 or higher.
🔧 Temporary Workarounds
Disable plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate file-manager
Restrict upload permissions
allRemove upload permissions from Subscriber and other non-admin roles.
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block file uploads with dangerous extensions
- Monitor file upload directories for suspicious files and implement file integrity monitoring
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for Bit File Manager version.
Check Version:
wp plugin get file-manager --field=version
Verify Fix Applied:
Confirm plugin version is 6.5.6 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to wp-content/plugins/file-manager directories
- POST requests to file manager upload endpoints from non-admin users
Network Indicators:
- HTTP POST requests to /wp-content/plugins/file-manager/backend/app/Http/Controllers/FileManagerController.php
SIEM Query:
source="wordpress.log" AND "file-manager" AND "upload" AND (user_role="subscriber" OR user_role!="administrator")
🔗 References
- https://plugins.trac.wordpress.org/browser/file-manager/trunk/backend/app/Http/Controllers/FileManagerController.php#L26
- https://plugins.trac.wordpress.org/browser/file-manager/trunk/libs/elFinder/php/elFinder.class.php#L1210
- https://plugins.trac.wordpress.org/browser/file-manager/trunk/libs/elFinder/php/elFinder.class.php#L3257
- https://plugins.trac.wordpress.org/browser/file-manager/trunk/libs/elFinder/php/elFinderConnector.class.php#L160
- https://plugins.trac.wordpress.org/changeset/3138710/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9cae7702-e531-45b9-9131-42edbc073a07?source=cve