1.0 Introduction
Recently, WordPress has released security updates to address a critical severity of vulnerability in Chartify WordPress Chart Plugins.
2.0 Impact
This vulnerability is possible to allow unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files, leads to bypass access controls, obtain sensitive data or achieve code execution.
3.0 Affected Products
- WordPress Chart Plugin version prior to 2.9.5
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the security updates released by Wordfence and apply the necessary updates.
Kindly refer to the following URL: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/chart-builder/chartify-wordpress-chart-plugin-295-unauthenticated-local-file-inclusion-via-source
Generally, we advise users of this device to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/chart-builder/chartify-wordpress-chart-plugin-295-unauthenticated-local-file-inclusion-via-source
- https://nvd.nist.gov/vuln/detail/CVE-2024-10571
- https://plugins.trac.wordpress.org/browser/chart-builder/tags/2.9.6/admin/partials/charts/actions/chart-builder-charts-actions-options.php?rev=3184238