Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-6460 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Local File Inclusion (LFI) in 'Grow by Tradedoubler'. πŸ’₯ **Consequences**: Attackers include malicious files via the `component` parameter.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Unvalidated user input in the `component` parameter. πŸ” **Flaw**: The plugin fails to sanitize input before including files, allowing path traversal. πŸ“‚

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin: **Grow by Tradedoubler**. πŸ“… **Versions**: **2.0.21 and earlier**. ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: 1. Read sensitive files (e.g., `wp-config.php`). 2. Execute arbitrary PHP code. 3. Gain **full control** of the server. πŸ”“

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Status**: **Unauthenticated** (per PoC titles). βš™οΈ **Config**: Requires valid WP credentials for some PoCs, but core LFI is often exploitable without login. High risk. 🎯

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploits**: **YES**. πŸ”— GitHub PoCs available (Nxploited, E1-Bot141). πŸ€– Nuclei templates exist. Wild exploitation likely. πŸš€

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Scan for plugin version < 2.0.22. 2. Use Nuclei template `CVE-2024-6460.yaml`. 3. Test `component` parameter for LFI. πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to version **2.0.22 or later**. πŸ“’ **Status**: Patch available. Official fix recommended immediately. βœ…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Disable/Uninstall** the plugin. 2. Block access to `/wp-content/plugins/grow/` via WAF. 3. Restrict file inclusion functions in `php.ini`. πŸ›‘

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. ⏰ **Priority**: **P1**. Unauthenticated LFI leading to RCE. Patch immediately to prevent server takeover. 🚨