Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-39312 β€” AI Deep Analysis Summary

CVSS 7.5 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in WordPress Plugin 'True Ranker'. πŸ’₯ **Consequences**: Attackers can read **arbitrary files** on the server. Critical data like `wp-config.php` is exposed. Total compromise of site secrets.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22** (Path Traversal). πŸ” **Flaw**: The `src` parameter in `examples.php` is not sanitized. It allows `../` sequences to escape the intended directory and access root/system files.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **True Ranker** WordPress Plugin. πŸ“‰ **Versions**: Before **v2.2.4**. Specifically tested on v2.2.2. Any version lacking the fix is vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Actions**: Read **sensitive configuration files**. πŸ”‘ **Data Access**: `wp-config.php` (DB credentials), `.htaccess`, system logs. No execution, but **High Confidentiality** impact.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. βš™οΈ **Config**: No authentication required (`PR:N`). Network accessible (`AV:N`). Easy to exploit via simple HTTP requests.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🧨 **Public Exp?**: **YES**. πŸ“œ **PoC**: Available via **Nuclei Templates** (ProjectDiscovery). Public exploits exist on PacketStorm. Wild exploitation is feasible.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for the specific file path: `/wp-content/plugins/true-ranker/admin/vendor/datatables/examples/resources/examples.php` πŸ” Look for `src` parameter manipulation in requests.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: **YES**. βœ… **Patch**: Upgrade True Ranker to **version 2.2.4** or later. The vendor has released a fixed version.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin immediately. πŸ›‘ **Mitigation**: Block access to `/admin/vendor/datatables/` via WAF or `.htaccess` if update is impossible.

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. πŸ“’ **Priority**: Patch immediately. CVSS Score is **High** (Confidentiality impact). No auth needed makes it an easy target for automated bots.