Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-49649 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A PHP Remote File Inclusion (RFI) flaw in 'Build App Online'. πŸ“‰ **Consequences**: Attackers can inject malicious PHP code via uncontrolled file paths.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-98 (Improper Control of Filename for Include/Require). πŸ› **Flaw**: The plugin fails to sanitize user input in PHP `include` or `require` statements.…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: WordPress Plugin 'Build App Online'. πŸ“¦ **Version**: 1.0.23 and earlier. 🏒 **Vendor**: hakeemnala. 🌐 **Platform**: WordPress sites running this specific plugin version. πŸ“… **Published**: Jan 7, 2025.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Execute arbitrary PHP code on the server. πŸ“‚ **Access**: Read sensitive local files (e.g., wp-config.php). πŸ”“ **Privileges**: Gain full administrative control (RCE).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. 🚫 **Auth**: No authentication required (PR:N). πŸ–±οΈ **UI**: No user interaction needed (UI:N). 🌍 **Network**: Remote exploitability (AV:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit for anyone. ⚑

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: No specific PoC code listed in data. πŸ” **Status**: VDB entries exist (Patchstack). 🌐 **Wild Exp**: Likely possible due to low complexity.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for 'Build App Online' plugin. πŸ“‹ **Version**: Check if version ≀ 1.0.23. πŸ§ͺ **Test**: Look for LFI/RFI parameters in plugin URLs. πŸ› οΈ **Tools**: Use WPScan or DAST tools to detect CWE-98 patterns.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Fixed?**: Yes, implied by CVE publication. πŸ“₯ **Action**: Update plugin to latest version. 🚫 **Avoid**: Do not use version 1.0.23 or older. πŸ”„ **Patch**: Check vendor 'hakeemnala' for official update.…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin immediately. πŸ›‘ **Remove**: Uninstall if not needed. πŸ›‘οΈ **WAF**: Block suspicious `include`/`require` patterns. πŸ”’ **Isolate**: Restrict server access to trusted IPs.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **CVSS**: 9.8 (Critical). ⏳ **Risk**: Remote, unauthenticated, high impact. πŸƒ **Action**: Patch NOW. πŸ“‰ **Priority**: Top of the list. πŸ›‘οΈ **Protect**: Your WordPress site is at immediate risk. ⚑