Icegram Engage is a popular WordPress plugin designed to create popups, opt-in forms, and other interactive elements to engage visitors. With over 30,000 active installations, it is widely used to enhance user experience on WordPress sites. However, a critical vulnerability (CVE-2024-13486) has been identified within the plugin that allows an attacker to execute stored Cross-Site Scripting (XSS) attacks. This vulnerability can be exploited by attackers to inject malicious JavaScript code, potentially leading to backdoor creation and unauthorized account takeover.

CVECVE-2024-13486
Icegram Engage < 3.1.32
CriticalHigh
All Time2 402 123
Active installations30 000+
Publicly PublishedMarch 11, 2025
Last UpdatedMarch 11, 2025
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13486
https://wpscan.com/vulnerability/cbba8346-41f6-46ee-89ae-ed9524d768ef/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

November 27, 2024Plugin testing and vulnerability detection in the Icegram Engage – Ultimate WP Popup Builder, Lead Generation, Optins, and CTA have been completed
November 27, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 11, 2025Registered CVE-2024-13486

Discovery of the Vulnerability

The vulnerability was discovered during testing of Icegram Engage’s “My First Icegram Campaign” functionality. The issue arises in the “CSS” field under the “Custom Code” section, where users can add custom styles and scripts for campaigns. The field does not adequately sanitize or validate user input, allowing attackers to inject JavaScript code into the form. When the malicious input is stored, it gets executed when the campaign is previewed. This vulnerability affects users with editor-level access or higher, enabling them to inject malicious code that could be executed by an admin or any other privileged user.

Understanding of XSS attack’s

Cross-Site Scripting (XSS) vulnerabilities occur when an attacker is able to inject malicious scripts into a website, which are then executed by the browser of unsuspecting users who visit the page. In WordPress, these vulnerabilities are particularly dangerous because they allow attackers to bypass security restrictions and execute arbitrary code. One real-world example of XSS exploitation is the CVE-2018-6389 vulnerability in WPForms, where attackers could inject JavaScript into form fields, resulting in session hijacking and administrative access. Similarly, CVE-2024-13486 in Icegram Engage enables attackers to inject JavaScript into the “CSS” field, allowing them to perform attacks such as stealing session cookies, executing arbitrary commands, or escalating privileges.

Exploiting the XSS Vulnerability

To exploit CVE-2024-13486, an attacker with editor+ privileges:

POC:

Duplicate "My First Icegram Campaign" in 127.0.0.1/wordpress/wp-admin/edit.php?post_typezig_campaign. Change "CSS" field to "</style><img src=x onerror=alert(1)>" in Custom Code section. Save it. To trigger XSS you should click Preview. (Admins and editors are allowed to use JS in posts/pages/comments/etc, so the unfiltered_html capability should be disallowed when testing for Stored XSS using such roles)

____

The risks posed by CVE-2024-13486 are significant. In a real-world scenario, an attacker could exploit this vulnerability to escalate privileges from an editor or contributor role to an admin role. Once the attacker gains admin access, they could take full control of the website, install malware, modify content, or steal sensitive information. For example, an attacker could inject scripts that steal session cookies, allowing them to impersonate administrators and take over the site. This type of attack could be especially damaging for websites that collect sensitive user data, such as e-commerce sites or membership platforms, where it could lead to data theft or unauthorized transactions.

Recommendations for Improved Security

To mitigate the risks associated with CVE-2024-13486, Icegram Engage users should update the plugin to the latest patched version. The plugin developers should implement proper input sanitization and validation for all fields that render user input, particularly the “CSS” field in the “Custom Code” section. WordPress functions like esc_html() and wp_kses() should be used to strip out any potentially harmful scripts. Additionally, site administrators should restrict access to sensitive plugin settings, ensuring that only trusted users have the ability to modify campaign settings. Regular security audits and the use of a Web Application Firewall (WAF) can help identify and block potential XSS attacks before they can be exploited. To prevent this type of attacks vendor used our methods of prevention.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-13486, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-13486- Icegram Engage – Stored XSS to JS Backdoor Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *