Slider & Popup Builder by Depicter Vulnerability – Authenticated (Contributor+) Arbitrary File Upload – CVE-2024-4389 | WordPress Plugin Vulnerability Report

Plugin Name: Slider & Popup Builder by Depicter – Add Image Slider, Carousel Slider, Exit Intent Popup, Popup Modal, Coupon Popup, Post Slider Carousel

Key Information:

  • Software Type: Plugin
  • Software Slug: depicter
  • Software Status: Active
  • Software Author: averta
  • Software Downloads: 1,314,164
  • Active Installs: 100,000
  • Last Updated: August 19, 2024
  • Patched Versions: 3.1.2
  • Affected Versions: <= 3.1.1

Vulnerability Details:

  • Name: Slider & Popup Builder by Depicter – Add Image Slider, Carousel Slider, Exit Intent Popup, Popup Modal, Coupon Popup, Post Slider Carousel <= 3.1.1
  • Title: Authenticated (Contributor+) Arbitrary File Upload
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE: CVE-2024-4389
  • CVSS Score: 8.8
  • Publicly Published: August 13, 2024
  • Researcher: Arkadiusz Hydzik
  • Description: The Slider and Carousel slider by Depicter plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadFile function in all versions up to, and including, 3.1.1. This makes it possible for authenticated attackers, with contributor access or higher, to upload arbitrary files on the affected site's server, which may make remote code execution possible.

Summary:

The Slider & Popup Builder by Depicter plugin for WordPress has a vulnerability in versions up to and including 3.1.1 that allows for authenticated (Contributor+) arbitrary file uploads. This vulnerability has been patched in version 3.1.2.

Detailed Overview:

The vulnerability, identified as CVE-2024-4389, was discovered by researcher Arkadiusz Hydzik. It affects the Slider & Popup Builder by Depicter plugin, which is widely used for adding image sliders, carousel sliders, exit intent popups, popup modals, and coupon popups to WordPress sites. The vulnerability exists due to missing file type validation in the uploadFile function, which allows authenticated attackers with contributor access or higher to upload arbitrary files to the affected site's server. This could potentially lead to remote code execution, allowing attackers to take control of the site.

The vulnerability is significant, with a CVSS score of 8.8, indicating a high level of risk. The plugin author has released a patch in version 3.1.2 to address this issue.

Advice for Users:

  • Immediate Action: Users of the Slider & Popup Builder by Depicter plugin are strongly encouraged to update to the patched version 3.1.2 immediately to protect their sites from potential exploitation.
  • Check for Signs of Vulnerability: Users should check their server logs for any unusual file uploads or unauthorized changes to the site, which could indicate a compromise.
  • Alternate Plugins: While a patch is available, users might still consider alternative plugins that offer similar functionality as an additional precaution.
  • Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities and keep your WordPress site secure.

Conclusion:

The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 3.1.2 or later to secure their WordPress installations.

References:

Detailed Report: 

In the fast-paced digital world, keeping your WordPress website secure is more critical than ever. One of the most common yet preventable threats to your site’s security is outdated plugins. These plugins, while essential for adding functionality and enhancing user experience, can become major security risks if not regularly updated. The latest example is a serious vulnerability discovered in the popular Slider & Popup Builder by Depicter plugin, which has been used by over 100,000 active WordPress sites.

Plugin Overview

The Slider & Popup Builder by Depicter plugin is widely used by WordPress site owners to add image sliders, carousel sliders, exit intent popups, popup modals, and coupon popups. Developed by averta, this plugin has been downloaded over 1.3 million times and is currently active on more than 100,000 websites. The plugin's last update was on August 19, 2024, when the developers released version 3.1.2 to address a critical security vulnerability.

Details of the Vulnerability

The vulnerability, identified as CVE-2024-4389, affects all versions of the Slider & Popup Builder by Depicter plugin up to and including 3.1.1. This vulnerability, known as an Authenticated (Contributor+) Arbitrary File Upload, was discovered by security researcher Arkadiusz Hydzik and publicly disclosed on August 13, 2024.

The issue arises from the plugin's failure to properly validate file types in its uploadFile function. This oversight allows authenticated users with contributor-level access or higher to upload arbitrary files to the server. The severity of this vulnerability is reflected in its CVSS score of 8.8, indicating a high level of risk. If exploited, this flaw could allow attackers to execute remote code, potentially giving them full control over your website.

Risks and Potential Impacts

For small business owners, the risks associated with this vulnerability are significant. An attacker who gains access through this vulnerability could:

  • Compromise your website’s integrity: They could modify your content, inject malicious code, or deface your site.
  • Steal sensitive data: If your site handles customer information, this data could be exfiltrated and used maliciously.
  • Launch further attacks: Your compromised site could be used as a platform to launch attacks on visitors or other websites.

Given the high level of access that this vulnerability could provide to an attacker, the potential impacts could be devastating, including loss of customer trust, financial loss, and damage to your brand's reputation.

How to Remediate the Vulnerability

Fortunately, the developers of the Slider & Popup Builder by Depicter plugin have already released a patch to address this vulnerability in version 3.1.2. To secure your website, it is crucial to:

  1. Update the Plugin Immediately: Ensure that you are using version 3.1.2 or later. Updating the plugin will close the vulnerability and protect your site from potential exploitation.
  2. Check for Signs of Compromise: Review your server logs and file system for any unauthorized changes or uploads. If you suspect that your site has been compromised, take immediate steps to clean and secure your site.
  3. Consider Alternative Plugins: While a patch is available, you may want to explore alternative plugins that offer similar functionality, especially if this is not the first security issue with the plugin.

Overview of Previous Vulnerabilities

It’s important to note that this is not the first vulnerability affecting this plugin. Since April 28, 2023, there have been five previous vulnerabilities reported. This history underscores the importance of remaining vigilant and ensuring that all plugins, especially those with a track record of security issues, are regularly updated and monitored.

Conclusion

The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. However, as a small business owner, staying on top of every security update can be daunting. This is why it's crucial to implement regular maintenance routines, including automatic updates, security scans, and backups.

If you're concerned about your website's security or simply don't have the time to manage these tasks, consider reaching out for professional assistance. Keeping your website secure not only protects your business but also ensures the trust and safety of your customers.

Remember, in the world of online security, staying one step ahead can make all the difference.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Slider & Popup Builder by Depicter Vulnerability – Authenticated (Contributor+) Arbitrary File Upload – CVE-2024-4389 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment