<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Anti-Malware Security and Bruteforce Firewall 4.20.59 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/anti-malware-security-and-bruteforce-firewall-4.20.59/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:22:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/anti-malware-security-and-bruteforce-firewall-4.20.59/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Anti-Malware Security and Bruteforce Firewall Directory Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-anti-malware-traversal/</link><pubDate>Sat, 16 May 2026 16:22:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-anti-malware-traversal/</guid><description>WordPress Anti-Malware Security and Bruteforce Firewall 4.20.59 contains a directory traversal vulnerability (CVE-2021-47977) that allows unauthenticated attackers to read arbitrary files by manipulating the file parameter in requests to admin-ajax.php.</description><content:encoded><![CDATA[<p>CVE-2021-47977 is a directory traversal vulnerability affecting version 4.20.59 of the WordPress Anti-Malware Security and Bruteforce Firewall plugin. Unauthenticated attackers can exploit this vulnerability to read arbitrary files on the server by crafting malicious requests to the <code>admin-ajax.php</code> endpoint. The vulnerability is triggered when the <code>duplicator_download</code> action is called with a manipulated <code>file</code> parameter containing path traversal sequences (e.g., <code>../</code>). Successful exploitation allows attackers to access sensitive files outside the intended directory, potentially exposing configuration files, database credentials, or other sensitive information. This vulnerability poses a significant risk to WordPress websites using the affected plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using Anti-Malware Security and Bruteforce Firewall version 4.20.59.</li>
<li>The attacker crafts an HTTP POST request targeting the <code>admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>duplicator_download</code>.</li>
<li>The attacker manipulates the <code>file</code> parameter within the POST request to include path traversal sequences (e.g., <code>../../../../etc/passwd</code>).</li>
<li>The WordPress server processes the request through the vulnerable plugin.</li>
<li>The plugin fails to properly sanitize or validate the <code>file</code> parameter, allowing the path traversal sequence to be processed.</li>
<li>The server attempts to read the file specified by the manipulated path.</li>
<li>The contents of the targeted file are returned in the HTTP response, allowing the attacker to read arbitrary files on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this directory traversal vulnerability (CVE-2021-47977) allows unauthenticated attackers to read arbitrary files on the affected WordPress server. This could lead to the disclosure of sensitive information such as database credentials, configuration files, or other sensitive data stored on the system. The impact of this vulnerability is significant, as it could enable attackers to gain unauthorized access to the website&rsquo;s database or other critical resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2021-47977 Exploitation Attempt - WordPress Anti-Malware Directory Traversal&rdquo; to your SIEM to detect exploitation attempts targeting this vulnerability.</li>
<li>Inspect webserver logs for suspicious POST requests to <code>admin-ajax.php</code> with the <code>action</code> parameter set to <code>duplicator_download</code> and the <code>file</code> parameter containing path traversal sequences, as highlighted in the Sigma rule (logsource: webserver, cs-uri-stem, cs-uri-query).</li>
<li>Consider using a Web Application Firewall (WAF) to filter requests containing path traversal sequences to mitigate the risk of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>directory-traversal</category><category>wordpress</category><category>plugin</category><category>cve-2021-47977</category></item></channel></rss>