Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-50493 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary File Upload in WordPress plugin 'Automatic Translation'. πŸ’₯ **Consequences**: Attackers upload malicious files (e.g., webshells).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). πŸ” **Flaw**: Missing file type validation in the upload mechanism. The plugin accepts ANY file extension without checking if it is safe.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **Automatic Translation**. πŸ“… **Versions**: **1.0.4 and earlier**. 🏒 **Vendor**: masterhomepage. 🌐 **Platform**: WordPress sites running this specific plugin.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Upload arbitrary files (PHP shells, scripts). πŸ”“ **Privileges**: **Unauthenticated** access required. πŸ“Š **Impact**: Full control over the server.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **VERY LOW**. πŸ”‘ **Auth**: **None required** (Unauthenticated). 🎯 **Complexity**: Low (AC:L). Simple HTTP POST request needed. No user interaction required (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit**: **YES**, Public POC available. πŸ“‚ **Source**: GitHub (RandomRobbieBF/CVE-2024-50493). πŸ“ **Details**: Curl command provided for arbitrary file upload. Wild exploitation is highly likely due to ease of use.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for plugin 'Automatic Translation' version <= 1.0.4. πŸ§ͺ **Test**: Attempt to upload a `.php` file via the plugin's upload interface. πŸ“‘ **Tools**: Use vulnerability scanners (e.g., Patchstack, WPScan…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update plugin to **version 1.0.5 or later** (implied by '1.0.4 and earlier' being vulnerable). πŸ“₯ **Action**: Check WordPress dashboard for updates.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: **Disable or Delete** the 'Automatic Translation' plugin if no update is available. πŸ›‘ **Mitigation**: Block upload endpoints via WAF (Web Application Firewall) if possible. πŸ”’ **Hardening**: Restrict fil…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL / IMMEDIATE**. ⏳ **Urgency**: High. CVSS 9.8 + Unauthenticated + Public POC = Active Threat. πŸš€ **Action**: Patch or disable **TODAY**. Do not wait for scheduled maintenance.