WordPress UpdraftPlus Plugin Vulnerability Impacts Millions of Websites (CVE-2024-10957)

WordPress UpdraftPlus plugin is vulnerable to a high-severity PHP object injection vulnerability. Tracked as CVE-2024-10957, the vulnerability may allow an unauthenticated attacker to delete arbitrary files, retrieve sensitive data, or execute code. According to WordPress, more than 3 million websites worldwide use the plugin.

UpdraftPlus is among the most popular scheduled backup and migration plugins. The plugin allows users to return to their preferred storage location and restore it in just three clicks. The plugin will enable users to schedule manually or run every 2, 4, 8, or 12 hours, daily, weekly, monthly or fortnightly.

Vulnerability Details

The deserialization of untrusted input exists in the recursive_unserialized_replace function. Successful exploitation of the vulnerability may allow an unauthenticated attacker to inject a PHP Object.

An administrator must perform a search and replace action to exploit the vulnerability. The vulnerable software contains no known POP chain. If a POP chain is present via an additional plugin or theme installed on the target system, t the attacker could delete arbitrary files, retrieve sensitive data, or execute code.

Affected versions

The vulnerability affects UpdraftPlus: WP Backup & Migration Plugin versions prior to 1.24.11.

Mitigation

Customers must upgrade to the UpdraftPlus: WP Backup & Migration Plugin version 1.24.12 to patch the vulnerability.

For more information about the mitigation, please refer to WordPress Security Advisory.

Qualys Detection

Qualys customers can scan their devices with QID 732150 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

References
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/updraftplus/updraftplus-wp-backup-migration-plugin-12411-unauthenticated-php-object-injection

Leave a Reply

Your email address will not be published. Required fields are marked *