CVE-2024-7856

9.1 CRITICAL

📋 TL;DR

This vulnerability in the MP3 Audio Player WordPress plugin allows authenticated attackers with subscriber-level access or higher to delete arbitrary files on the server due to missing capability checks and insufficient path validation. Attackers can potentially achieve remote code execution by deleting critical files like wp-config.php. All WordPress sites using this plugin up to version 5.7.0.1 are affected.

💻 Affected Systems

Products:
  • MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar WordPress plugin
Versions: All versions up to and including 5.7.0.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least subscriber-level WordPress user account. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through remote code execution by deleting wp-config.php, leading to database access, admin takeover, and potential server compromise.

🟠

Likely Case

Site disruption or defacement through deletion of critical WordPress files, configuration files, or media assets.

🟢

If Mitigated

Limited impact if proper file permissions and WordPress hardening are in place, though file deletion could still cause service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but only at subscriber level. The vulnerability is straightforward to exploit once an attacker has valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.7.0.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3142445/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar'
4. Click 'Update Now' if update is available
5. Alternatively, download version 5.7.0.2+ from WordPress plugin repository

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the MP3 Audio Player plugin until patched

wp plugin deactivate mp3-music-player-by-sonaar

Restrict user registration

all

Disable new user registration to prevent attackers from obtaining subscriber accounts

Set 'Anyone can register' to false in WordPress Settings → General

🧯 If You Can't Patch

  • Remove the plugin entirely and use alternative audio player solutions
  • Implement strict file permissions (wp-config.php should be 400 or 440, web root files should have proper ownership)

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 5.7.0.1 or lower, you are vulnerable.

Check Version:

wp plugin get mp3-music-player-by-sonaar --field=version

Verify Fix Applied:

Verify plugin version is 5.7.0.2 or higher after update. Check that the removeTempFiles() function now includes proper capability checks.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in WordPress debug logs
  • Multiple failed login attempts followed by file deletion requests
  • HTTP POST requests to admin-ajax.php with 'removeTempFiles' action

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=removeTempFiles' parameter
  • Unusual file paths in POST parameters

SIEM Query:

source="wordpress.log" AND "removeTempFiles" AND ("file=" OR "delete")

🔗 References

📤 Share & Export