Plataforma
wordpress
Componente
cs-framework
Corrigido em
7.1.1
CVE-2024-12036 describes an Arbitrary File Read vulnerability within the CS Framework plugin for WordPress. This flaw allows authenticated attackers, even those with subscriber-level access, to read arbitrary files on the server. The vulnerability impacts versions of the CS Framework plugin up to and including 6.9. Mitigation involves upgrading to a patched version or implementing temporary workarounds.
An attacker exploiting CVE-2024-12036 can leverage the getwidgetsettings_json() function to read any file accessible by the webserver process. This includes configuration files, database credentials, and potentially even source code. Successful exploitation could lead to complete compromise of the WordPress instance and the underlying server. The ability to read sensitive files could facilitate further attacks, such as privilege escalation or data exfiltration. While requiring authentication, the low privilege threshold (subscriber access) significantly expands the potential attack surface.
As of the publication date (2025-03-07), there is no indication of this vulnerability being actively exploited in the wild. No public proof-of-concept (POC) code has been released. The vulnerability has not been added to the CISA KEV catalog. The CVSS score of 7.5 (HIGH) indicates a significant potential impact if exploited.
WordPress websites using the CS Framework plugin, particularly those with subscriber-level users who have access to plugin settings. Shared hosting environments where multiple WordPress installations share the same server resources are at increased risk, as a compromise of one site could potentially expose files on the entire server.
• wordpress / composer / npm:
grep -r 'get_widget_settings_json()' /var/www/html/wp-content/plugins/cs-framework/• generic web:
curl -I 'https://your-wordpress-site.com/wp-content/plugins/cs-framework/get_widget_settings_json?file=/etc/passwd' # Attempt to read a sensitive filedisclosure
Status do Exploit
EPSS
0.18% (percentil 40%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2024-12036 is to upgrade the CS Framework plugin to a version that addresses the vulnerability. If immediate upgrading is not feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to block requests targeting the vulnerable getwidgetsettings_json() function with potentially malicious parameters. Restrict file permissions on the server to minimize the impact of a successful read. After upgrading, confirm the fix by attempting to access arbitrary files via the plugin's settings interface and verifying that access is denied.
Actualice el plugin CS Framework a la última versión disponible. Esto solucionará la vulnerabilidad de lectura arbitraria de archivos. Si no hay una versión disponible, considere deshabilitar el plugin hasta que se publique una actualización.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-12036 is a vulnerability in the CS Framework WordPress plugin allowing authenticated subscribers to read arbitrary files on the server, potentially exposing sensitive data.
You are affected if your WordPress site uses the CS Framework plugin version 7.1 or earlier. Check your plugin versions and upgrade immediately.
Upgrade the CS Framework plugin to the latest version. If upgrading is not immediately possible, implement a WAF rule to block access to the vulnerable function.
As of the publication date, there is no evidence of active exploitation, but the vulnerability's severity warrants immediate attention.
Refer to the CS Framework plugin's official website or WordPress plugin repository for updates and advisories related to CVE-2024-12036.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.