CVE-2024-9193

9.8 CRITICAL

📋 TL;DR

This vulnerability in the WHMpress WordPress plugin allows unauthenticated attackers to include and execute arbitrary PHP files on the server via Local File Inclusion. Attackers can leverage this to gain administrative access by modifying WordPress settings and registering themselves as administrators. All WordPress sites using WHMpress plugin versions up to 6.3-revision-0 are affected.

💻 Affected Systems

Products:
  • WHMpress - WHMCS WordPress Integration Plugin
Versions: All versions up to and including 6.3-revision-0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WHMpress plugin active. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise with administrative access, data theft, defacement, and potential server takeover if combined with other vulnerabilities.

🟠

Likely Case

Administrative account creation leading to site takeover, data exfiltration, and malware installation.

🟢

If Mitigated

Limited impact if file uploads are restricted and proper file permissions prevent PHP execution in upload directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward with publicly available proof-of-concept code. Attackers can chain this with file upload capabilities to achieve remote code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 6.3-revision-0

Vendor Advisory: https://whmpress.com/docs/change-log/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WHMpress plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Immediate Plugin Deactivation

all

Temporarily disable the vulnerable plugin to prevent exploitation

wp plugin deactivate whmpress

Restrict File Upload Directories

linux

Prevent PHP execution in WordPress upload directories

echo 'deny from all' > /path/to/wp-content/uploads/.htaccess
chmod 644 /path/to/wp-content/uploads/.htaccess

🧯 If You Can't Patch

  • Immediately deactivate and remove the WHMpress plugin from all WordPress installations
  • Implement web application firewall rules to block requests to whmpress_domain_search_ajax_extended_results function

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WHMpress version 6.3-revision-0 or earlier

Check Version:

wp plugin get whmpress --field=version

Verify Fix Applied:

Verify WHMpress plugin version is higher than 6.3-revision-0 or plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'whmpress_domain_search_ajax_extended_results' in URL parameters
  • Unusual file inclusion attempts in WordPress logs
  • Multiple failed login attempts followed by successful admin login from new IP

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with whmpress parameters
  • Unusual file uploads to WordPress media library

SIEM Query:

source="wordpress.log" AND "whmpress_domain_search_ajax_extended_results"

🔗 References

📤 Share & Export