Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2024-6220 โ€” AI Deep Analysis Summary

CVSS 9.8 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Critical flaw in **Keydatas** WordPress plugin (v2.5.2 & prior). Missing file type validation in `keydatas_downloadImages`. ๐Ÿ’ฅ **Consequences**: Attackers can upload **arbitrary files** to the server.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The `keydatas_downloadImages` function fails to verify file extensions or MIME types before saving.โ€ฆ

Q3Who is affected? (Versions/Components)

๐Ÿ‘ฅ **Affected**: **WordPress Plugin: Keydatas** (aka "็ฎ€ๆ•ฐ้‡‡้›†ๅ™จ"). ๐Ÿ“ฆ **Vendor**: zhengdon. ๐Ÿ“… **Versions**: **2.5.2 and earlier**. If you use this plugin for data scraping, you are at risk. ๐Ÿšซ Not fixed in these versions.

Q4What can hackers do? (Privileges/Data)

๐Ÿ’€ **Attacker Capabilities**: Unauthenticated access. ๐Ÿ“ค Upload **any file** (e.g., PHP webshells). ๐Ÿ–ฅ๏ธ Execute arbitrary code on the server. ๐Ÿ”“ Gain full control over the WordPress site. ๐Ÿ“‚ Access sensitive data.โ€ฆ

Q5Is exploitation threshold high? (Auth/Config)

โšก **Exploitation Threshold**: **LOW**. ๐Ÿšซ **Auth Required**: None (Unauthenticated). ๐ŸŒ **Access**: Network (AV:N). ๐ŸŽฏ **Complexity**: Low (AC:L). ๐Ÿ™… **User Interaction**: None (UI:N).โ€ฆ

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ” **Public Exploit**: **YES**. ๐Ÿ“œ **PoC Available**: Nuclei template exists (`CVE-2024-6220.yaml`). ๐ŸŒ **Detection**: Easily detectable via automated scanners.โ€ฆ

Q7How to self-check? (Features/Scanning)

๐Ÿ”Ž **Self-Check**: 1. Check WordPress plugins for **Keydatas**. 2. Verify version is **โ‰ค 2.5.2**. 3. Run Nuclei scan with CVE-2024-6220 template. 4.โ€ฆ

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿ› ๏ธ **Official Fix**: **YES**. ๐Ÿ“ฅ **Patch**: Update to version **> 2.5.2**. ๐Ÿ”— **Reference**: WordPress Trac changeset 3127334. ๐Ÿ”„ **Action**: Immediately update the plugin via WordPress dashboard or manual replacement.โ€ฆ

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch Workaround**: 1. **Disable/Deactivate** the Keydatas plugin immediately. 2. Remove plugin files if not needed. 3. Block upload endpoints via WAF (Web Application Firewall). 4.โ€ฆ

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: **CRITICAL**. ๐Ÿšจ **Priority**: **P0/Immediate Action**. โณ **Time**: Patch now. With CVSS 9.8 and no auth required, this is a "zero-day" style risk for active sites.โ€ฆ