CVE-2024-8852

5.3 MEDIUM

📋 TL;DR

The All-in-One WP Migration and Backup plugin for WordPress exposes sensitive information through publicly accessible log files. Unauthenticated attackers can view potentially sensitive data like full server paths. All WordPress sites using this plugin up to version 7.86 are affected.

💻 Affected Systems

Products:
  • All-in-One WP Migration and Backup plugin for WordPress
Versions: All versions up to and including 7.86
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full server paths, database credentials, or other sensitive configuration details leading to further attacks like directory traversal or targeted exploitation.

🟠

Likely Case

Attackers discover server paths and directory structures, enabling reconnaissance for additional vulnerabilities or targeted attacks.

🟢

If Mitigated

Limited exposure of non-critical path information with minimal impact if proper access controls and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing publicly exposed log files via HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.87 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3168605%40all-in-one-wp-migration&new=3168605%40all-in-one-wp-migration&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'All-in-One WP Migration and Backup'. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.87+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict access to log files

linux

Add .htaccess rules to block public access to plugin log directories

# Add to .htaccess in WordPress root
<Files "*.log">
    Order Allow,Deny
    Deny from all
</Files>
# Block access to plugin log directory
RedirectMatch 403 /wp-content/plugins/all-in-one-wp-migration/.*\.log$

Disable plugin temporarily

linux

Deactivate the plugin until patched if immediate update is not possible

wp plugin deactivate all-in-one-wp-migration

🧯 If You Can't Patch

  • Remove or restrict public access to the plugin's log directory via web server configuration
  • Implement web application firewall rules to block requests to .log files

🔍 How to Verify

Check if Vulnerable:

Check if plugin version is 7.86 or earlier in WordPress admin or by examining /wp-content/plugins/all-in-one-wp-migration/readme.txt

Check Version:

wp plugin get all-in-one-wp-migration --field=version

Verify Fix Applied:

Confirm plugin version is 7.87 or later and test that accessing /wp-content/plugins/all-in-one-wp-migration/*.log returns 403/404

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to .log file requests in web server logs
  • Unusual access patterns to plugin directories

Network Indicators:

  • GET requests to paths containing '/all-in-one-wp-migration/' and '.log' extension

SIEM Query:

source="web_server_logs" AND (uri="/wp-content/plugins/all-in-one-wp-migration/*.log" OR uri LIKE "%.log") AND response="200"

🔗 References

📤 Share & Export