CVE-2024-49326: Affiliator WP Plugin: Unauthenticated Web Shell Upload
CRITICAL PoC AVAILABLE CISA: TRACK*CVE-2024-49326 is a critical unauthenticated arbitrary file upload in WordPress Affiliator plugin (≤2.1.3) enabling web shell deployment with no credentials required. Any WordPress server hosting this plugin alongside AI APIs, model inference endpoints, or data pipelines is exposed to full host compromise. Disable or remove the plugin immediately—no patched version is confirmed available.
Risk Assessment
Risk is critical. CVSS 9.8 with AV:N/AC:L/PR:N/UI:N means automated scanners and script-kiddies can exploit at scale without any prior access. Full CIA triad impact confirmed. The absence of a confirmed patched version means organizations must remove the plugin entirely rather than patching. AI/ML servers sharing infrastructure with WordPress deployments face downstream compromise of model credentials, API keys, and training data.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| affiliator | pip | — | No patch |
Do you use affiliator? You're affected.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
Audit all WordPress installations: check active plugins for Affiliator ≤2.1.3 (wp plugin list --status=active).
-
Disable and remove the plugin immediately; no patched version confirmed.
-
Deploy WAF rules blocking multipart POST uploads to wp-content/plugins/affiliator paths.
-
Hunt for existing compromise: find /var/www -name '*.php' -newer /var/www/wp-config.php -mtime -90.
-
Review web server access logs for POST requests to plugin upload endpoints originating from unusual IPs.
-
Rotate all API keys and credentials stored on or accessible from the affected host.
-
If compromise suspected, isolate host, preserve logs, and conduct forensic review before restoring.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-49326?
CVE-2024-49326 is a critical unauthenticated arbitrary file upload in WordPress Affiliator plugin (≤2.1.3) enabling web shell deployment with no credentials required. Any WordPress server hosting this plugin alongside AI APIs, model inference endpoints, or data pipelines is exposed to full host compromise. Disable or remove the plugin immediately—no patched version is confirmed available.
Is CVE-2024-49326 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-49326, increasing the risk of exploitation.
How to fix CVE-2024-49326?
1. Audit all WordPress installations: check active plugins for Affiliator ≤2.1.3 (wp plugin list --status=active). 2. Disable and remove the plugin immediately; no patched version confirmed. 3. Deploy WAF rules blocking multipart POST uploads to wp-content/plugins/affiliator paths. 4. Hunt for existing compromise: find /var/www -name '*.php' -newer /var/www/wp-config.php -mtime -90. 5. Review web server access logs for POST requests to plugin upload endpoints originating from unusual IPs. 6. Rotate all API keys and credentials stored on or accessible from the affected host. 7. If compromise suspected, isolate host, preserve logs, and conduct forensic review before restoring.
What systems are affected by CVE-2024-49326?
This vulnerability affects the following AI/ML architecture patterns: web application frontends hosting AI services, shared infrastructure with AI API gateways, WordPress-based AI demo or documentation portals, model serving environments on multi-tenant web servers.
What is the CVSS score for CVE-2024-49326?
CVE-2024-49326 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 0.58%.
Technical Details
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability in Vasilis Kerasiotis Affiliator allows Upload a Web Shell to a Web Server.This issue affects Affiliator: from n/a through 2.1.3.
Exploitation Scenario
Automated WordPress scanner identifies a site running Affiliator ≤2.1.3. Attacker crafts a multipart POST request to the plugin's file upload handler, submitting a PHP web shell with a spoofed image MIME type. The shell is written to the WordPress uploads or plugin directory and immediately accessible via HTTP. Attacker uses the shell to enumerate the host, finds .env files containing OpenAI/Anthropic API keys and database connection strings for a connected RAG system, exfiltrates them, and establishes persistence via crontab. Secondary attack: API keys used to exfiltrate proprietary training data or launch cost-harvesting attacks against the victim's AI services.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2025-49655 9.8 keras: Deserialization enables RCE
Same package: keras CVE-2025-12060 9.8 keras: Path Traversal enables file access
Same package: keras CVE-2024-3660 9.8 Keras: RCE via malicious model deserialization
Same package: keras CVE-2025-1550 9.8 Keras: safe_mode bypass enables RCE via model loading
Same package: keras CVE-2026-1462 8.8 Keras: safe_mode bypass allows RCE via model deserialization
Same package: keras
AI Threat Alert