Plattform
wordpress
Komponente
woolook
Behoben in
1.7.1
CVE-2024-54375 describes a Path Traversal vulnerability within the Woolook WordPress plugin. This flaw allows attackers to include arbitrary files on the server, potentially leading to sensitive information disclosure or remote code execution. Versions of Woolook prior to 1.7.1 are affected, and a patch has been released to address the issue.
The Path Traversal vulnerability in Woolook allows an attacker to bypass intended access restrictions and include files from outside the intended directory. By manipulating file paths, an attacker could potentially include sensitive system files, configuration files, or even other PHP scripts. Successful exploitation could lead to the disclosure of confidential data, modification of website functionality, or even complete server compromise. The ability to execute arbitrary PHP code elevates the risk significantly, potentially enabling attackers to gain persistent access and control over the affected WordPress installation.
CVE-2024-54375 was publicly disclosed on December 16, 2024. While no public proof-of-concept (PoC) code has been widely reported, the ease of exploitation associated with Path Traversal vulnerabilities suggests a potential for rapid exploitation. The EPSS score is likely to be medium, reflecting the vulnerability's relatively straightforward exploitation and potential impact. It is not currently listed on the CISA KEV catalog.
WordPress websites utilizing the Woolook plugin, particularly those running versions prior to 1.7.1, are at risk. Shared hosting environments where multiple WordPress installations share the same server resources are especially vulnerable, as a compromise of one site could potentially lead to the compromise of others.
• wordpress / composer / npm:
grep -r '../' /var/www/html/wp-content/plugins/woolook/*• generic web:
curl -I 'http://your-wordpress-site.com/wp-content/plugins/woolook/../../../../etc/passwd' # Check for file disclosuredisclosure
Exploit-Status
EPSS
0.33% (56% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-54375 is to immediately upgrade the Woolook plugin to version 1.7.1 or later. If upgrading is not immediately feasible due to compatibility concerns or breaking changes, consider implementing temporary workarounds. These may include restricting file access permissions on the server, implementing a Web Application Firewall (WAF) with rules to block suspicious path traversal attempts (e.g., filtering for '../' sequences), and closely monitoring server logs for unusual activity. After upgrading, confirm the vulnerability is resolved by attempting a path traversal request and verifying that access is denied.
Actualice el plugin Woolook a la última versión disponible. Si no hay una versión más reciente, considere deshabilitar o eliminar el plugin hasta que se publique una actualización que corrija la vulnerabilidad. Consulte la documentación del plugin o contacte al desarrollador para obtener más información.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-54375 is a Path Traversal vulnerability in the Woolook WordPress plugin, allowing attackers to include arbitrary files and potentially execute code.
You are affected if you are using Woolook version 1.7.0 or earlier. Upgrade to version 1.7.1 to mitigate the risk.
Upgrade the Woolook WordPress plugin to version 1.7.1 or later. Consider WAF rules as a temporary workaround if upgrading is not immediately possible.
As of December 2024, there are no confirmed reports of active exploitation, but the vulnerability's ease of exploitation warrants immediate attention.
Refer to the official Woolook plugin documentation and WordPress security announcements for the latest advisory and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.