平台
wordpress
组件
woocommerce-support-ticket-system
修复版本
17.6.1
CVE-2024-10625 represents a critical security vulnerability affecting the WooCommerce Support Ticket System plugin for WordPress. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server, potentially leading to remote code execution. The issue stems from insufficient file path validation within the plugin and impacts versions up to and including 17.7. A patch is available, and immediate action is recommended.
The impact of CVE-2024-10625 is severe due to the potential for remote code execution. An attacker exploiting this vulnerability could delete critical WordPress configuration files, such as wp-config.php, effectively gaining control of the entire WordPress installation. This could lead to data breaches, website defacement, malware injection, and complete compromise of the server. The ease of exploitation, requiring no authentication, significantly increases the risk. Deletion of other sensitive files could also expose database credentials or other confidential information.
CVE-2024-10625 was publicly disclosed on November 9, 2024. While no active exploitation campaigns have been definitively confirmed, the vulnerability's ease of exploitation and critical severity make it a high-priority target. The potential for RCE elevates this vulnerability to a significant risk. Public proof-of-concept exploits are likely to emerge, further increasing the risk of exploitation.
Websites utilizing the WooCommerce Support Ticket System plugin, particularly those running older versions (≤17.6), are at significant risk. Shared hosting environments are especially vulnerable as they often have limited control over file permissions and plugin updates. WordPress installations with default configurations and inadequate security measures are also highly susceptible.
• wordpress / composer / npm:
grep -r 'delete_tmp_uploaded_file' /var/www/html/wp-content/plugins/woocommerce-support-tickets/• wordpress / composer / npm:
wp plugin list --status=inactive | grep woocommerce-support-tickets• wordpress / composer / npm:
find /var/www/html/wp-content/uploads/tmp -type f -mtime +7 -deletedisclosure
漏洞利用状态
EPSS
40.62% (97% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2024-10625 is to immediately upgrade the WooCommerce Support Ticket System plugin to a version that addresses the vulnerability. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting file uploads and deleting any temporary upload directories. Implement strict file permissions on the WordPress installation to limit the impact of a successful file deletion. Monitor WordPress logs for suspicious file deletion activity. After upgrading, confirm the fix by attempting a file deletion request through a vulnerable endpoint and verifying that the request is denied.
将 WooCommerce Support Ticket System 插件更新到最新可用版本。该漏洞允许任意文件删除,这可能会危及网站的安全性。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2024-10625 is a critical vulnerability in the WooCommerce Support Ticket System plugin allowing unauthenticated attackers to delete arbitrary files, potentially leading to remote code execution.
If you are using WooCommerce Support Ticket System version 17.6 or earlier, you are affected by this vulnerability and should upgrade immediately.
Upgrade the WooCommerce Support Ticket System plugin to the latest version that addresses the vulnerability. If immediate upgrade is not possible, implement temporary workarounds like restricting file uploads.
While no confirmed active exploitation campaigns have been reported, the vulnerability's severity and ease of exploitation make it a high-priority target, and exploitation is likely.
Refer to the WooCommerce security advisory for detailed information and updates: [https://woocommerce.com/security/](https://woocommerce.com/security/)
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。