Description

Hackers are actively exploiting vulnerability in the WordPress plugin. As a result of the vulnerability, CVE-2024-6220, unauthenticated threat actors could upload arbitrary files to a vulnerable website and take control of it remotely. Updated plugins and robust security measures are key to preventing such alarming developments. The vulnerability was found during Wordfence's Bug Bounty Program's 0-day Threat Hunt Promo on June 18, 2024, by a researcher named Foxyyy. The flaw can be found in the Keydatas plugin. The vulnerability was confirmed exploitation attempts were observed within days. Known as CVE-2024-6220, this vulnerability allows unauthenticated arbitrary file uploads because the keydatas_downloadImages function does not validate file types. The Keydatas pluigns was connects to the WordPress site primarily used to manage WordPress posts. As part of the plugin's keydatas_post_doc() function, a password check is performed, but "keydatas.com" is set as the default password. The function uses file_get_contents() to download files specified by the __kds_docImgs request parameter, then uses file_put_contents() to upload them. Users of Wordfence Premium, Care, and Response received a firewall rule to protect against this vulnerability on June 20, 2024. When the Keydatas team failed to respond on June 20, 2024, the issue was escalated to the WordPress.org Security Team, which shut down the plugin on July 16, 2024. In order to defend against such exploits, plugins should be regularly updated, vulnerability scans should be conducted, and firewall protection should be robust. With the exploitation with the CVE-2024-6220 Vulnerability in the Keydatas plugin explains the need of vigilance of maintaining the website security.