QID 150726

Date Published: 2023-10-11

QID 150726: WordPress Media Library Assistant Plugin: Remote Code Execution Vulnerability (CVE-2023-4634)

Media Library Assistant is a back-end plugin that helps to organise and manage media files on WordPress.

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.

Affected versions:
The Media Library Assistant plugin prior to 3.10

QID Detection Logic :
This QID sends an HTTP GET request and retrieves a vulnerable version of a plugin running on the target application.

Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to upgrade to Media Library Assistant plugin 3.10 or later version to remediate this vulnerability.

    Vendor References

    CVEs related to QID 150726

    Software Advisories
    Advisory ID Software Component Link
    Media Library Assistant URL Logo wordpress.org/plugins/media-library-assistant/#developers
    Media Library Assistant URL Logo plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4