Cyber Security News

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

A critical security vulnerability in the “Security & Malware scan by CleanTalk” plugin has left over 30,000 WordPress websites exposed to exploitation.

The vulnerability, identified as CVE-2024-13365, allows unauthenticated attackers to conduct arbitrary file uploads, potentially leading to remote code execution (RCE).

The flaw, assigned a CVSS score of 9.8 (Critical), affects all plugin versions up to and including 2.149. Users are strongly urged to update to the patched version, 2.150, immediately.

Technical Overview

The vulnerability arises from the way the plugin handles ZIP file uploads, primarily through the vulnerable checkUploadedArchive() function of the UploadChecker class.

When the plugin scans an uploaded ZIP file for malware, it extracts the archive to a publicly accessible directory in the WordPress uploads folder without adequate authentication checks.

The flaw lies in the fact that the plugin’s file-checking mechanism (spbc_is_user_logged_in()) only verifies the presence of a “wordpress_logged_in” cookie.

This insufficient authentication check allows attackers to bypass restrictions and upload malicious files even when unauthenticated.

Once extracted, attackers can include a malicious PHP script in the ZIP file, which results in executing arbitrary commands on the server.

Moreover, the destination path for these extracted files is determined using the wp_get_upload_dir() function, making the malicious files publicly accessible.

This opens the door for attackers to deploy webshells or other backdoors, granting them full control over the compromised site.

Risk and Exploitation

The issue is particularly dangerous because it allows any attacker—without authentication or administrative access—to:

  1. Upload large ZIP files containing thousands of dummy .txt files alongside a malicious .php file.
  2. Exploit the server’s resources to extract and process these files, overwhelming the server.
  3. Access the malicious .php file remotely, triggering RCE and gaining complete control over the site.

Such attacks could lead to full site compromise, data breaches, or even server-level exploitation, depending on the attacker’s objectives.

Security researcher Lucio Sá, who identified the flaw, has collaborated with CleanTalk to release a patched version (2.150) of the plugin.

WordPress administrators using this plugin must immediately upgrade to this version to mitigate the risk.

For enhanced protection, site owners leveraging WordPress firewalls, such as Wordfence, are advised to enable the “Disable Code Execution for Uploads directory” option.

This can block malicious file execution from the uploads folder, adding an extra layer of defense.

This incident highlights the critical importance of regular plugin updates and robust security practices on WordPress sites.

The 30,000 WordPress sites exposed to exploitation via file upload vulnerability underline the risks associated with unpatched plugins.

Site administrators should act swiftly by updating the plugin and double-checking all security settings to minimize their attack surface in the future.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations, particularly…

7 hours ago

Uncovering the Security Risks of Data Exposure in AI-Powered Tools like Snowflake’s CORTEX

As artificial intelligence continues to reshape the technological landscape, tools like Snowflake’s CORTEX Search Service…

7 hours ago

UNC3944 Hackers Shift from SIM Swapping to Ransomware and Data Extortion

UNC3944, a financially-motivated threat actor also linked to the group known as Scattered Spider, has…

7 hours ago

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800 compromised…

7 hours ago

Hackers Bypass AI Filters from Microsoft, Nvidia, and Meta Using a Simple Emoji

Cybersecurity researchers have uncovered a critical flaw in the content moderation systems of AI models…

8 hours ago

Microsoft Alerts That Default Helm Charts May Expose Kubernetes Apps to Data Leaks

Microsoft’s cybersecurity research team has issued a stark warning about the risks of using default…

8 hours ago