CRITICALCVE-2024-49254CVSS 10

WordPress ajax-extend plugin <= 1.0 - Remote Code Execution (RCE) vulnerability

traduction en cours…

Plateforme

wordpress

Composant

ajax-extend

Corrigé dans

1.0.1

AI Confidence: highNVDEPSS 0.2%Révisé: mai 2026
Traduction vers votre langue…

CVE-2024-49254 describes a Remote Code Execution (RCE) vulnerability within the ajax-extend WordPress plugin. This flaw allows attackers to inject arbitrary code, leading to complete server compromise. The vulnerability impacts versions of ajax-extend up to and including 1.0, with a fix available in version 1.0.1. Prompt patching is strongly recommended.

WordPress

Détecte cette CVE dans ton projet

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.

Impact et Scénarios d'Attaquetraduction en cours…

The impact of this RCE vulnerability is severe. An attacker exploiting this flaw can execute arbitrary code on the affected WordPress server with the privileges of the web server user. This could lead to complete system compromise, including data exfiltration, malware installation, and defacement of the website. The attacker could potentially gain access to sensitive data stored on the server, including user credentials, database information, and configuration files. Given the plugin's functionality (likely extending AJAX capabilities), an attacker could leverage this to manipulate website functionality and potentially pivot to other systems on the network.

Contexte d'Exploitationtraduction en cours…

CVE-2024-49254 was publicly disclosed on 2024-10-16. The vulnerability's ease of exploitation and the potential for significant impact suggest a medium to high probability of exploitation. As of this writing, no public proof-of-concept (PoC) code has been widely released, but the RCE nature of the vulnerability makes it a high-priority target for attackers. Monitor CISA and vendor advisories for updates and potential exploitation campaigns.

Qui Est à Risquetraduction en cours…

Websites using the ajax-extend plugin, particularly those running older versions (≤1.0), are at significant risk. Shared hosting environments are especially vulnerable, as a compromised plugin on one site could potentially impact other sites on the same server. Sites with weak security configurations or outdated WordPress installations are also at higher risk.

Étapes de Détectiontraduction en cours…

• wordpress / composer / npm:

wp plugin list | grep ajax-extend

• wordpress / composer / npm:

wp plugin update ajax-extend --version=1.0.1

• wordpress / composer / npm:

grep -r 'eval(' /var/www/html/wp-content/plugins/ajax-extend/*

• generic web: Check WordPress plugin directory for mentions of the vulnerability and potential exploit attempts.

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

EPSS

0.23% (percentile 45%)

CISA SSVC

Exploitationpoc
Automatisableyes
Impact Techniquetotal

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H10.0CRITICALAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeChangedImpact au-delà du composant affectéConfidentialityHighRisque d'exposition de données sensiblesIntegrityHighRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Modifié — l'attaque peut pivoter au-delà du composant vulnérable.
Confidentiality
Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
Integrity
Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantajax-extend
FournisseurSunjianle
Plage affectéeCorrigé dans
0.0.0 – 1.01.0.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. EPSS mis à jour

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2024-49254 is to immediately upgrade the ajax-extend plugin to version 1.0.1 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily disabling the plugin. Web application firewalls (WAFs) configured with rules to detect and block code injection attempts may provide some protection. Monitor WordPress logs for suspicious activity, particularly requests containing unusual characters or patterns that might indicate an exploitation attempt. After upgrading, verify the fix by attempting to trigger the vulnerability through a known attack vector (if available) and confirming that the code injection is prevented.

Comment corrigertraduction en cours…

Actualiza el plugin ajax-extend a una versión posterior a la 1.0. Si no hay una versión disponible, considera desinstalar el plugin hasta que se publique una versión corregida. Esto evitará la ejecución remota de código en tu sitio web.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2024-49254 — RCE in ajax-extend WordPress Plugin?

CVE-2024-49254 is a critical Remote Code Execution vulnerability in the ajax-extend WordPress plugin, allowing attackers to execute arbitrary code on the server.

Am I affected by CVE-2024-49254 in ajax-extend WordPress Plugin?

You are affected if you are using ajax-extend version 1.0 or earlier. Upgrade to 1.0.1 to mitigate the risk.

How do I fix CVE-2024-49254 in ajax-extend WordPress Plugin?

Upgrade the ajax-extend plugin to version 1.0.1 or later through the WordPress plugin manager or via the command line using wp plugin update ajax-extend --version=1.0.1.

Is CVE-2024-49254 being actively exploited?

While no widespread exploitation has been confirmed, the vulnerability's severity and ease of exploitation suggest a high probability of future attacks.

Where can I find the official ajax-extend advisory for CVE-2024-49254?

Check the ajax-extend plugin's official website or WordPress plugin repository for the latest advisory and updates.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.