Flaw in UpdraftPlus Plugin Exposes Millions of WordPress Sites to Unauthenticated PHP Object Injection Exploits

Cyberattack Disrupts Online Services at Sarapu Town Hall

Summary: A critical vulnerability (CVE-2024-10957) in the UpdraftPlus Backup & Migration Plugin, affecting over 3 million WordPress sites, could allow unauthenticated attackers to exploit PHP Object Injection vulnerabilities. This flaw has a CVSS score of 8.8 and requires an administrator action to trigger the exploit.

Threat Actor: Unauthenticated attackers | unauthenticated attackers
Victim: UpdraftPlus Plugin Users | UpdraftPlus Plugin Users

Key Point :

  • Vulnerability allows deletion of arbitrary files, access to sensitive data, and execution of arbitrary code.
  • Exploitation requires an administrator to perform a search-and-replace operation within the plugin.
  • All versions up to and including 1.24.11 are affected; users must update to version 1.24.12 immediately.
  • Identified by security researcher Webbernaut, the flaw poses significant risks due to the plugin’s widespread use.

A newly discovered vulnerability in the UpdraftPlus Backup & Migration Plugin, used by over 3 million WordPress websites globally, has raised significant security concerns. Identified as CVE-2024-10957 and assigned a CVSS score of 8.8, the flaw could allow unauthenticated attackers to exploit PHP Object Injection vulnerabilities under certain conditions.

The vulnerability resides in the recursive_unserialized_replace function, which improperly handles the deserialization of untrusted input. While no known PHP Object POP (Property-Oriented Programming) chain exists in the plugin itself, the presence of additional vulnerable plugins or themes on the affected WordPress installation could enable attackers to:

  • Delete arbitrary files.
  • Access sensitive data.
  • Execute arbitrary code.

Importantly, this exploit requires an administrator to perform a search-and-replace operation within the plugin to trigger the malicious payload.

Security researcher Webbernaut has been credited with identifying and responsibly disclosing the CVE-2024-10957 flaw.

This vulnerability affects all versions of UpdraftPlus up to and including 1.24.11. Given the plugin’s widespread adoption, a vast number of WordPress sites could be at risk if corrective measures are not promptly implemented.

What could have happened?

Successful exploitation of this vulnerability could have had severe consequences, potentially allowing attackers to:

  • Delete critical website files: Disrupting the website’s functionality or even taking it offline completely.
  • Steal sensitive data: Accessing confidential information such as user credentials, database details, or financial records.
  • Execute arbitrary code: Taking complete control of the website and using it for malicious purposes like distributing malware or launching further attacks.

Urgent Action Required

The UpdraftPlus team has addressed this vulnerability in version 1.24.12. All users are strongly urged to update their plugin to this version immediately.

Related Posts:

Share

Source:
https://securityonline.info/cve-2024-10957-exposes-over-3-million-wordpress-sites-to-unauthenticated-php-object-injection-exploits/