WordPress Plugin Vulnerabilities

[0day] AIT CSV Import / Export <= 3.0.3 - Unauthenticated Arbitrary File Upload

Description

The WPScan research team discovered an active exploitation attempt against a 0day vulnerability within the premium AIT CSV Import / Export WordPress plugin within our honeypot logs.

The honeypot log showed a GET request to the following file:

/wp-content/plugins/ait-csv-import-export/admin/upload-handler.php

The HTTP request was made on November 12th, 2020 at 05:45 UTC.

After investigating the issue we were able to create a working exploit in the latest version of the plugin, which was version 3.0.3 at the time of writing.

Multiple attempts were made to contact the plugin vendors, but as of writing, we have yet to have a response.

The details of the issue were released to ensure our users and the wider WordPress community were aware of this attack and could take remediating actions.

Arbitrary file deletion may also be possible in the same affected file.

Proof of Concept

Affects Plugins

References

Miscellaneous

Original Researcher
Ryan of WPScan
Verified
Yes

Timeline

Publicly Published
2020-11-13 (about 5 years ago)
Added
2020-11-13 (about 5 years ago)
Last Updated
2020-11-14 (about 5 years ago)

Other