Form Maker by 10Web is a widely used plugin for creating and managing forms in WordPress. However, a critical vulnerability, CVE-2024-10562, has been discovered in the plugin that allows for Stored Cross-Site Scripting (XSS) attacks. This flaw enables attackers with editor-level privileges to inject malicious JavaScript code into form settings, which is stored and executed when the form is rendered. The injected script can create a backdoor, allowing attackers to escalate their privileges and potentially gain full control over the site. With over 50,000 active installations, this vulnerability poses a significant security risk for WordPress websites using Form Maker by 10Web.

CVECVE-2024-10562
PluginForm Maker by 10Web < 1.15.31
CriticalHigh
All Time2 154 561
Active installations50 000+
Publicly PublishedDecember 17, 2024
Last UpdatedDecember 17, 2024
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10562
https://wpscan.com/vulnerability/317f6cb7-774f-4381-a855-858c051aa1d5/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

October 10, 2024Plugin testing and vulnerability detection in the Form Maker by 10Web have been completed
October 10, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
December 17, 2024Registered CVE-2024-10562

Discovery of the Vulnerability

The vulnerability was discovered during a security audit of the Form Maker plugin. The issue lies in the plugin’s “Form Header” section, specifically in the “Image” field. When a user injects a malicious payload into this field, the input is not properly sanitized before being saved in the WordPress database. As a result, when the form is rendered on the frontend, the injected JavaScript is executed, leading to potential session hijacking or account takeover. The flaw exists because the plugin does not properly validate user input in certain fields, allowing malicious code to be injected by users with minimal privileges, such as editors.

Understanding of XSS attack’s

Cross-Site Scripting (XSS) vulnerabilities occur when an attacker is able to inject malicious JavaScript into web pages, which are then executed in the browsers of users who view the page. These attacks can lead to various malicious actions, including session hijacking, credential theft, and privilege escalation. XSS vulnerabilities are particularly dangerous in WordPress because many plugins and themes allow users to input dynamic content, which can be manipulated to inject malicious scripts. A real-world example of an XSS vulnerability in WordPress occurred in the WPForms plugin, where attackers could inject JavaScript into form fields, leading to session hijacking. Similarly, CVE-2024-10562 exploits improper input sanitization in Form Maker, allowing for malicious script injection and the execution of arbitrary JavaScript when the form is rendered.

Exploiting the XSS Vulnerability

To exploit CVE-2024-10562, an attacker with editor-level privileges:

POC:

Create a new form by Form Maker. You should  change "Image" field in "Form Header" section to "Malicious JS code eval() and etc. For example 123" onmouseover=alert(1)// -> Save Settings (Admins and editors are allowed to use JS in posts/pages/comments/etc, so the unfiltered_html capability should be disallowed when testing for Stored XSS using such roles)

____

The potential risks associated with CVE-2024-10562 are substantial. If exploited, this vulnerability could allow an attacker to hijack an administrator’s session or escalate their privileges to gain full control over the WordPress site. Once the attacker has admin access, they can modify content, install malicious plugins, steal sensitive data, or deface the site. For websites dealing with sensitive information, such as e-commerce or membership sites, the impact of this vulnerability could be catastrophic. It could lead to data breaches, financial losses, and reputational damage. Furthermore, an attacker could use the backdoor created through this vulnerability to maintain persistent access to the site, even if the administrator changes their password. This could also be used as a springboard for further attacks on other systems connected to the compromised WordPress site.

Recommendations for Improved Security

To mitigate the risks associated with CVE-2024-10562, administrators should update Form Maker to the latest version as soon as a patch is available. Additionally, administrators should ensure that all user inputs, particularly those in fields like the “Image” field in the “Form Header” section, are properly sanitized and validated before being saved and rendered. It is also recommended to disable the unfiltered_html capability for non-admin users to prevent them from injecting JavaScript into plugin settings. Implementing Content Security Policies (CSP) can help reduce the risk of XSS attacks by blocking the execution of untrusted scripts. Regular security audits and using security plugins that detect XSS vulnerabilities should be part of the site’s overall security strategy. To prevent this type of attacks vendor used our methods of prevention.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-10562, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-10562 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *