Atomic Edge analysis of CVE-2024-10938 (metadata-based):
This vulnerability is an instance of embedded malicious code (CWE-506). The OVRI Payment plugin version 1.7.0 contained one or more .htaccess files with malicious directives. These directives are designed to block the execution of legitimate scripts while explicitly allowing the execution of known malicious PHP files. The vulnerability description indicates the files are within the plugin’s directory. The risk arises if these files are moved to a higher-level directory, such as the site root, where they could affect the entire website’s behavior. The root cause is the intentional inclusion of harmful configuration files within the plugin’s distribution package. The exploitation method does not involve a remote attacker triggering a flaw. Instead, exploitation is contingent on the site administrator or a separate vulnerability moving the malicious .htaccess file. The impact is the disruption of normal site function and the potential execution of unauthorized PHP scripts, leading to integrity and availability loss. A fix requires the plugin author to release a clean version that removes the malicious files. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) confirms network accessibility, low attack complexity, no privileges required, no user interaction, and impacts integrity and availability.

CVE-2024-10938: OVRI Payment 1.7.0 – Malicious .htaccess directive (moneytigo)
CVE-2024-10938
moneytigo
1.7.0
—
Analysis Overview
Differential between vulnerable and patched code
Proof of Concept (PHP)
NOTICE :
This proof-of-concept is provided for educational and authorized security research purposes only.
You may not use this code against any system, application, or network without explicit prior authorization from the system owner.
Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.
This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.
By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.
Frequently Asked Questions
What is CVE-2024-10938?
Overview of the vulnerabilityCVE-2024-10938 is a medium severity vulnerability in the OVRI Payment plugin for WordPress, specifically in version 1.7.0. It involves malicious .htaccess files that prevent the execution of legitimate scripts while allowing known malicious PHP files.
How does this vulnerability work?
Mechanism of exploitationThe vulnerability works by embedding malicious directives in .htaccess files within the plugin. These directives block legitimate script execution while permitting harmful PHP files, potentially disrupting site functionality if the files are moved outside the plugin’s directory.
Who is affected by this vulnerability?
Identifying vulnerable installationsAny WordPress site using the OVRI Payment plugin version 1.7.0 is affected. Administrators should check their installed plugins to determine if they are running this specific version.
How can I check if my site is vulnerable?
Steps to verify plugin versionTo check if your site is vulnerable, log in to your WordPress admin dashboard, navigate to the Plugins section, and look for the OVRI Payment plugin. Verify that the version is 1.7.0.
What should I do if I find the vulnerable version?
Immediate actions to takeIf you find that your site is using the vulnerable version, you should immediately remove the plugin or update it to a secure version if available. Additionally, check for any .htaccess files that may have been affected.
What does a CVSS score of 6.5 indicate?
Understanding the severity ratingA CVSS score of 6.5 indicates a medium severity level, meaning the vulnerability poses a moderate risk. It requires low complexity to exploit and does not need special privileges or user interaction, which could lead to integrity and availability issues.
What are the risks associated with this vulnerability?
Potential impacts on the websiteThe risks include disruption of normal site functionality and the potential execution of unauthorized PHP scripts. This can lead to loss of data integrity and availability, affecting the overall security of the website.
How can I mitigate this vulnerability?
Preventive measures to takeTo mitigate this vulnerability, remove the OVRI Payment plugin version 1.7.0 from your site immediately. Monitor your site for any unauthorized changes and ensure that your WordPress installation and all plugins are kept up to date.
What is the proof of concept for this vulnerability?
Demonstrating the issueThe proof of concept for CVE-2024-10938 involves demonstrating how the malicious .htaccess directives can block legitimate scripts while allowing harmful PHP files to execute. This can be tested by analyzing the .htaccess files included with the plugin.
Will there be a fix for this vulnerability?
Future updates from the plugin authorA fix will require the plugin author to release a clean version of the OVRI Payment plugin that removes the malicious .htaccess files. Keep an eye on the plugin’s official page for updates and patches.
What should I do if I have already moved the .htaccess files?
Steps to rectify the situationIf you have moved the .htaccess files, revert them to their original location within the plugin directory or remove them entirely. Review your website for any signs of unauthorized script execution or other security issues.
How can I stay informed about vulnerabilities like this?
Resources for ongoing security updatesTo stay informed about vulnerabilities, regularly check security advisories from sources like the National Vulnerability Database, WordPress security blogs, and follow updates from plugin developers.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.
Trusted by Developers & Organizations






