CVE-2024-5429 is a critical vulnerability identified in the Logo Slider Free plugin, which is used by over 30,000 WordPress installations to create logo sliders. The flaw allows an attacker with contributor-level access to inject malicious JavaScript (JS) into the plugin’s settings, specifically in the “Brand Name” field. If exploited, this Stored Cross-Site Scripting (XSS) vulnerability can lead to admin account takeover and the creation of persistent backdoors, compromising the entire WordPress site.

CVECVE-2024-5429
PluginLogo Slider < 4.1.0
CriticalHigh
All Time63 620 343
Active installations30 000+
Publicly PublishedSeptember 14, 2024
Last UpdatedSeptember 14, 2024
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5429
https://wpscan.com/vulnerability/ddb76c88-aeca-42df-830e-abffd29f1141/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

May 20, 2024Plugin testing and vulnerability detection in the Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider WordPress Plugin have been completed
May 20, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
September 14, 2024Registered CVE-2024-5429

Discovery of the Vulnerability

During routine security testing, a vulnerability was discovered in the Logo Slider Free plugin, particularly in the “Brand Name” field. The plugin fails to properly sanitize user inputs in this field, making it vulnerable to XSS attacks. This allows attackers to embed malicious JavaScript that executes when administrators or other privileged users interact with the compromised logo slider.

Understanding of XSS attack’s

Cross-Site Scripting (XSS) occurs when web applications fail to sanitize user inputs, allowing attackers to inject and execute malicious code. In WordPress, XSS vulnerabilities are especially dangerous as they can be exploited to manipulate site content, steal sensitive data, or escalate privileges.

Stored XSS, as seen in CVE-2024-5429, is a form of XSS where the malicious script is stored in the website’s database, allowing it to be triggered repeatedly whenever the affected content is accessed. This vulnerability enables an attacker to inject JavaScript into the Logo Slider Free plugin’s “Brand Name” field, which can be used to hijack admin sessions, create unauthorized accounts, or install backdoors.

Exploiting the XSS Vulnerability

To exploit CVE-2024-5429, an attacker with contributor access can create a new logo slider and insert a payload such as:

POC:

Create a new Logo Slider. Change "Brand Name" field to 123" onmouseover=alert(1)//

____

The risks associated with CVE-2024-5429 are significant, as this vulnerability could lead to a complete site takeover. If an attacker successfully exploits this vulnerability, they could gain admin-level access, create additional backdoors, or manipulate site content. In real-world scenarios, such exploitation could lead to compromised e-commerce sites, data theft, or the use of the compromised site to distribute malware.

High-traffic websites using the Logo Slider Free plugin are particularly at risk, as attackers can leverage this vulnerability to compromise admin accounts, steal data, or even launch phishing attacks through the compromised site.

Recommendations for Improved Security

To mitigate the risks posed by CVE-2024-5429, WordPress site administrators should update the Logo Slider Free plugin to the latest version as soon as a patch is released. Developers must implement proper input sanitization for all fields, particularly the “Brand Name” field, to ensure that malicious scripts cannot be injected.

Administrators should review and restrict user roles and permissions, especially for contributors, to limit their ability to insert unfiltered HTML or JavaScript. Installing a security plugin that monitors and blocks XSS attempts can provide additional protection. Regular audits of plugin settings and WordPress configurations are essential to prevent future vulnerabilities.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-5429, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-5429 – Logo Slider Free – Stored XSS to Admin Account Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *