Add vpatch-CVE-2025-49071 rule and test#1760
Add vpatch-CVE-2025-49071 rule and test#1760crowdsec-automation wants to merge 4 commits intomasterfrom
Conversation
|
Hello @crowdsec-automation and thank you for your contribution! ❗ It seems that the following scenarios are not part of the 'crowdsecurity/appsec-virtual-patching' collection: 🔴 crowdsecurity/vpatch-CVE-2025-49071 🔴 |
|
Hello @crowdsec-automation and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
This rule detects exploitation attempts against the Flozen WordPress theme (CVE-2025-49071), which allows unauthenticated attackers to upload arbitrary ZIP files via the vulnerable
wp_handle_uploadAJAX action. The detection logic is as follows:/wp-admin/admin-ajax.php, which is the endpoint used for WordPress AJAX actions.actionwith the valuewp_handle_upload, which is the specific action exploited by the attack..zipextension is being uploaded (as the exploit uploads a ZIP archive containing a webshell).All
value:fields are lowercase, and all relevant transforms (lowercase,urldecode) are applied to ensure case-insensitive and normalized matching. The rule usescontains,equals, andendsWithas appropriate, avoiding regex unless necessary. This approach minimizes false positives and negatives by tightly matching the exploit's characteristics. The test nuclei template simulates the exploit and expects a 403 response, confirming the rule's blocking behavior.