PHP Object Injection Vulnerability in UpdraftPlus WordPress Backup & Migration Plugin
CVE-2024-10957

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
4 January 2025

Badges

📈 Score: 835📰 News Worthy

What is CVE-2024-10957?

CVE-2024-10957 is a vulnerability affecting the UpdraftPlus Backup & Migration Plugin for WordPress, which is designed to facilitate seamless backups and migrations of WordPress sites. This particular vulnerability involves a PHP Object Injection flaw that can be exploited through the deserialization of untrusted input within the 'recursive_unserialized_replace' function. When exploited, it allows unauthenticated attackers to inject malicious PHP objects. Such an intrusion could have serious repercussions for organizations, potentially leading to the unauthorized execution of commands, access to sensitive information, or even total system compromise if certain conditions are met.

Technical Details

The vulnerability exists in all versions of the UpdraftPlus plugin up to and including 1.24.11. The flaw is rooted in the way the plugin handles input deserialization, which can be manipulated by attackers to create PHP Objects without proper validation or authentication. Exploitation of this vulnerability requires an administrator to perform a specific action—search and replace within the plugin—at which point the exploitation of the PHP Object Injection could occur. If additional plugins or themes introduce a vulnerable point of execution (POP chain), the consequences could be more severe, allowing for arbitrary file deletion or retrieval of sensitive data.

Potential Impact of CVE-2024-10957

  1. Unauthorized Access: An attacker could leverage this vulnerability to gain unauthorized access to the website's backend, potentially leading to further exploitation of the system and its resources.

  2. Data Breaches: The vulnerability allows for the possibility of sensitive data exposure, as attackers could retrieve confidential information stored within the affected WordPress installation.

  3. Remote Code Execution: In environments where an additional exploitable context exists (via other plugins or themes), the vulnerability could permit attackers to execute arbitrary code on the server, compromising the integrity of the entire system.

Affected Version(s)

UpdraftPlus: WP Backup & Migration Plugin * <= 1.24.11

News Articles

Wordpress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration Plugin, potentially impacting over 3 million WordPress websites.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by GBHackers News

  • Vulnerability published

  • Vulnerability Reserved

Credit

Craig Smith
.