Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-25094 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated Remote Code Execution (RCE) via unrestricted file upload. πŸ“‰ **Consequences**: Attackers upload malicious ZIP files (fonts) to execute arbitrary OS commands on the server.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-306 (Missing Authentication for Critical Function). πŸ” **Flaw**: The `add_custom_font` API endpoint allows uploading unverified ZIP files without prior authentication.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: WordPress Plugin **Tatsu Builder**. πŸ“… **Affected**: Versions **<= 3.3.11**. 🌐 **Scope**: WordPress sites using this specific page builder plugin.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Unauthenticated access (No login needed). πŸ’» **Action**: Execute arbitrary OS commands (RCE). πŸ“‚ **Data**: Read/Write server files, install backdoors, pivot to internal networks.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🚫 **Auth**: None required. 🌐 **Config**: Only requires the plugin to be installed and active. 🎯 **Ease**: Automated scripts available for instant exploitation.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Exploit**: **YES**. πŸ“‚ **PoCs**: Multiple public exploits on GitHub (e.g., `CVE-2021-25094-tatsu-preauth-rce`). πŸ“‘ **Wild**: Active exploitation detected; 100,000+ sites at risk.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for `wp-admin/admin-ajax.php` with `action=add_custom_font`. πŸ“Š **Tools**: Use Nuclei templates (`CVE-2021-25094.yaml`). πŸ•΅οΈ **Verify**: Check if plugin version is <= 3.3.11.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: **YES**. πŸ“₯ **Patch**: Update Tatsu Builder to version **3.3.12** or later. βœ… **Status**: Official vendor release addresses the authentication gap.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable the plugin if not in use. 🚫 **Block**: Restrict access to `admin-ajax.php` via WAF rules. πŸ›‘ **Limit**: Prevent unauthenticated POST requests to font upload endpoints.

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority**: **CRITICAL**. 🚨 **Urgency**: Immediate action required. ⚠️ **Reason**: Unauthenticated RCE allows instant full server takeover. πŸƒ **Action**: Patch NOW.