Platform
wordpress
Component
image-classify
Fixed in
1.0.1
CVE-2024-51789 describes an Arbitrary File Access vulnerability within UjW0L Image Classify. This flaw allows attackers to upload files of any type, including malicious web shells, to the web server. The vulnerability affects versions up to and including 1.0.0, and a patch is available in version 1.0.1.
The primary impact of CVE-2024-51789 is the ability for an attacker to upload arbitrary files to the server. This includes web shells, which provide remote code execution capabilities. Successful exploitation grants the attacker complete control over the affected server, enabling them to steal sensitive data, modify website content, install malware, or pivot to other systems on the network. The blast radius extends to any data stored on the server and potentially to other systems accessible from the compromised host. The ease of file upload significantly elevates the risk, making this a high-priority vulnerability to address.
CVE-2024-51789 was published on November 11, 2024. The vulnerability's simplicity and the potential for remote code execution suggest a high probability of exploitation. While no public exploits or active campaigns have been definitively linked to this CVE as of this writing, the ease of exploitation makes it a likely target. The CVSS score of 10 (CRITICAL) reflects the severity of the potential impact.
Exploit Status
EPSS
0.16% (37% percentile)
CISA SSVC
CVSS Vector
The recommended mitigation for CVE-2024-51789 is to immediately upgrade UjW0L Image Classify to version 1.0.1 or later. If upgrading is not immediately feasible, consider implementing strict file upload validation on the server-side to prevent the upload of executable files. Web Application Firewalls (WAFs) configured to block suspicious file uploads can provide an additional layer of defense. Monitor server logs for unusual file upload activity, particularly attempts to upload files with extensions commonly associated with web shells (e.g., .php, .jsp, .asp). After upgrading, verify the fix by attempting to upload a test file with a known malicious extension; the upload should be rejected.
Actualice el plugin Image Classify a una versión posterior a la 1.0.0. Si no hay una versión disponible, considere deshabilitar o eliminar el plugin hasta que se publique una versión corregida. Esto evitará la carga de archivos no autorizados y la posible ejecución de código malicioso en su servidor.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-51789 is a critical vulnerability in UjW0L Image Classify allowing attackers to upload arbitrary files, including web shells, potentially leading to full server compromise. It affects versions up to 1.0.0.
You are affected if you are running UjW0L Image Classify version 1.0.0 or earlier. Immediately assess your systems and upgrade to a patched version.
Upgrade UjW0L Image Classify to version 1.0.1 or later. Implement strict file upload validation as an interim measure if immediate upgrading is not possible.
While no confirmed active campaigns have been publicly reported, the vulnerability's ease of exploitation suggests a high probability of exploitation. Continuous monitoring is crucial.
Refer to the UjW0L Image Classify official website or security advisory page for the latest information and updates regarding CVE-2024-51789.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.