Learn about CVE-2021-24981 affecting Directorist – Business Directory Plugin < 7.0.6.2, allowing CSRF to Remote File Upload. Find out the impact, technical details, and mitigation steps.
Directorist – Business Directory Plugin < 7.0.6.2 - CSRF to Remote File Upload is a vulnerability that allows Cross-Site Request Forgery leading to arbitrary PHP shell uploads in the WordPress wp-content/plugins directory.
Understanding CVE-2021-24981
This CVE affects the Directorist WordPress plugin versions prior to 7.0.6.2 and presents a security risk related to Cross-Site Request Forgery (CSRF) to Remote File Upload.
What is CVE-2021-24981?
The Directorist WordPress plugin before version 7.0.6.2 is susceptible to a CSRF attack that permits unauthorized file uploads, potentially allowing threat actors to upload malicious PHP shells into the plugin directory.
The Impact of CVE-2021-24981
This vulnerability can be exploited by attackers to upload malicious files to the WordPress site, potentially leading to arbitrary code execution, data theft, or other malicious activities.
Technical Details of CVE-2021-24981
The technical details of this CVE include:
Vulnerability Description
The vulnerability arises from a lack of CSRF protection, enabling threat actors to trick authenticated users into carrying out unintended actions such as uploading malicious PHP files.
Affected Systems and Versions
The affected product is the Directorist – Business Directory Plugin with versions prior to 7.0.6.2.
Exploitation Mechanism
Attackers can exploit this vulnerability by crafting a malicious link or URL that, when clicked by an authenticated user, triggers the unauthorized file upload process.
Mitigation and Prevention
To address CVE-2021-24981, consider the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates for WordPress plugins and ensure timely installation of patches to address known vulnerabilities.