Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-51789 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary File Upload vulnerability in 'Image Classify' plugin. πŸ’₯ **Consequences**: Attackers can upload malicious files (e.g., webshells) to the server.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type). The plugin fails to properly validate or restrict file types during the upload process.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin 'Image Classify'. πŸ“… **Version**: 1.0.0 and earlier versions. 🏒 **Vendor**: UjW0L. If you use this plugin, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Hacker Actions**: Upload arbitrary files (PHP shells, scripts). πŸ“Š **Privileges**: Execute code with the web server's privileges.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. 🌐 **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). πŸ“‘ **Access**: Network accessible (AV:N). This is an unauthenticated, remote exploit. Very easy to trigger!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp?**: Yes, referenced in Patchstack database. πŸ“ **PoC**: Specific vulnerability details are public. ⚠️ **Wild Exploitation**: Likely possible given the low complexity and lack of authentication required.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: 1. Check installed plugins for 'Image Classify'. 2. Verify version is <= 1.0.0. 3. Scan for unauthorized file uploads in upload directories. πŸ› οΈ Use vulnerability scanners to detect this specific CVE.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update 'Image Classify' plugin to the latest version (post-1.0.0). πŸ“₯ **Source**: Check official WordPress repository or vendor site. πŸ”„ **Mitigation**: If update isn't possible, disable the plugin immediately.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Disable** the plugin immediately. 2. Remove the plugin files if not needed. 3. Implement WAF rules to block dangerous file extensions (.php, .exe, etc.) in upload paths. πŸ›‘ Stop the bleeding!

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. 🚨 **Priority**: P1. CVSS Score is High (likely 9.8+ based on vector). Unauthenticated remote code execution potential. Patch or disable NOW. Do not wait!