Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2024-10571 โ€” AI Deep Analysis Summary

CVSS 9.8 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Unauthenticated Local File Inclusion (LFI) via the 'source' parameter. <br>๐Ÿ’ฅ **Consequences**: Attackers can include & execute arbitrary PHP files on the server.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: CWE-98 (Improper Control of Filename for Include/Require). <br>๐Ÿ” **Flaw**: The plugin fails to sanitize the 'source' input, allowing direct file path manipulation.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: Chartify โ€“ WordPress Chart Plugin. <br>๐Ÿ“‰ **Versions**: 2.9.5 and earlier. <br>๐Ÿข **Vendor**: ays-pro.

Q4What can hackers do? (Privileges/Data)

๐Ÿ•ต๏ธ **Hackers Can**: Execute arbitrary PHP code. <br>๐Ÿ“‚ **Access**: Obtain sensitive data, bypass authentication, and achieve Remote Code Execution (RCE). <br>๐Ÿ”“ **Privileges**: Unauthenticated access required.

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ“‰ **Threshold**: LOW. <br>๐Ÿ”‘ **Auth**: None required (Unauthenticated). <br>๐ŸŒ **Network**: Remote (AV:N). <br>โšก **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ”ฅ **Exploitation**: YES. <br>๐Ÿ“œ **PoC Available**: Yes, public PoCs exist on GitHub (e.g., RandomRobbieBF, ProjectDiscovery Nuclei templates). <br>โš ๏ธ **Wild Exploit**: High risk of automated scanning.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Scan for 'source' parameter injection in Chartify plugin requests. <br>๐Ÿ› ๏ธ **Tools**: Use Nuclei templates or custom scripts targeting the 'source' endpoint.โ€ฆ

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Fix**: Update to version **2.9.6** or later. <br>๐Ÿ“ **Reference**: WordPress Trac shows fixes in 2.9.6 release. <br>โœ… **Status**: Patched.

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch?**: Disable the plugin immediately. <br>๐Ÿ”’ **Mitigation**: Restrict file access via .htaccess or WAF rules blocking 'source' parameter manipulation. <br>๐Ÿ‘ฎ **Monitor**: Watch for suspicious PHP execution logs.

Q10Is it urgent? (Priority Suggestion)

๐Ÿšจ **Urgency**: CRITICAL. <br>๐Ÿ”ฅ **Priority**: P1. <br>โณ **Reason**: CVSS 9.8 (High), Unauthenticated, RCE possible. Patch immediately to prevent server takeover.