PT-2024-3159 · Unknown +1 · Valvepress Automatic +1
Rafie Muhammad
·
Published
2024-02-25
·
Updated
2025-08-27
·
CVE-2024-27956
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L |
Name of the Vulnerable Software and Affected Versions:
ValvePress Automatic versions prior to 3.92.1
Description:
The issue is related to an SQL Injection vulnerability in the ValvePress Automatic plugin, which allows attackers to execute arbitrary SQL commands. This can lead to the creation of new administrator accounts, backdoor installations, and potentially full control over affected sites. The vulnerability is being actively exploited, with over 5.5 million attempts reported. It affects versions prior to 3.92.1.
Recommendations:
For versions prior to 3.92.1, update to version 3.92.1 to secure your site.
As a temporary workaround, consider disabling the `wp-automatic` plugin until a patch is available.
Restrict access to the vulnerable `inc/csv.php` file to minimize the risk of exploitation.
Avoid using the `q` parameter in the affected API endpoint until the issue is resolved.
Exploit
Fix
SQL injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 69
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_automatic_sqli_to_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956⭐ 94 🔗 23 · Exploit
- 🔥 https://github.com/diego-tella/CVE-2024-27956-RCE⭐ 83 🔗 25 · Exploit
- 🔥 https://github.com/truonghuuphuc/CVE-2024-27956⭐ 18 · Exploit
- 🔥 https://github.com/ThatNotEasy/CVE-2024-27956⭐ 7 🔗 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2024-27956 · Security Note
- https://bdu.fstec.ru/vul/2024-03372 · Security Note
- https://t.me/cvenotify/111415 · Telegram Post
- https://t.me/proxy_bar/2079 · Telegram Post
- https://xakep.ru/2024/04/27/wp-automatic-attacks · Note
- https://twitter.com/autumn_good_35/status/1785267112396931193 · Twitter Post
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27956 · Note
- https://twitter.com/Dinosn/status/1770110037651824662 · Twitter Post
- https://twitter.com/smarttech247/status/1785202425374130395 · Twitter Post
- https://twitter.com/cracbot/status/1771321586341020021 · Twitter Post