The WPScan research team discovered an active exploitation attempt against a 0day vulnerability within the premium AIT CSV Import / Export WordPress plugin within our honeypot logs. The honeypot log showed a GET request to the following file: /wp-content/plugins/ait-csv-import-export/admin/upload-handler.php The HTTP request was made on November 12th, 2020 at 05:45 UTC. After investigating the issue we were able to create a working exploit in the latest version of the plugin, which was version 3.0.3 at the time of writing. Multiple attempts were made to contact the plugin vendors, but as of writing, we have yet to have a response. The details of the issue were released to ensure our users and the wider WordPress community were aware of this attack and could take remediating actions. Arbitrary file deletion may also be possible in the same affected file.
curl -F '[email protected]' http://www.example.com/wp-content/plugins/ait-csv-import-export/admin/upload-handler.php The plugin.csv contents were: sep=;<?php echo('hacked'); ?>
UPLOAD
2020-11-13 (about 2 years ago)
2020-11-13 (about 2 years ago)
2020-11-14 (about 2 years ago)