CVE-2024-12743 – MailPoet – Stored XSS to JS Backdoor Creation – POC

CVE-2024-12743 – MailPoet – Stored XSS to JS Backdoor Creation – POC

MailPoet is a popular WordPress plugin that enables users to easily create and send newsletters, manage subscribers, and automate email campaigns. With over 600,000 active installations, it has become a trusted tool for WordPress users looking to enhance their email marketing capabilities. However, a critical vulnerability, CVE-2024-12743, has been discovered in the plugin that allows attackers to exploit Stored Cross-Site Scripting (XSS), leading to a potential account takeover and backdoor creation. This vulnerability affects users with editor-level privileges and can be triggered through the plugin’s form-building interface.

Plugin Security Certification (PSC-2025-64568): “JetBackup” – Version 3.1.7.9: Use Backups with Enhanced Security

Plugin Security Certification (PSC-2025-64568): “JetBackup” – Version 3.1.7.9: Use Backups with Enhanced Security

In the realm of WordPress site management, backup integrity and security are non-negotiable. Whether you’re running a small blog or a full-fledged eCommerce platform, one of the most crucial components of your WordPress infrastructure is a reliable and secure backup solution. That’s where JetBackup shines — a powerful, comprehensive plugin designed to perform backups, restorations, migrations, and cloning with simplicity, efficiency, and now — certified security.

As of version 3.1.7.9, JetBackup has officially passed the Plugin Security Certification (PSC-2025-64568) issued by CleanTalk, confirming that its codebase adheres to strict security and coding standards. This certification provides peace of mind for site owners and administrators, verifying that JetBackup doesn’t just offer robust functionality — it does so safely and responsibly.

Whether you’re downloading a local copy, uploading backups to the cloud, or performing emergency restorations, JetBackup ensures every operation is executed with integrity, transparency, and security at its core.

CVE-2024-13482- Icegram Engage – Stored XSS to JS Backdoor Creation – POC

CVE-2024-13482- Icegram Engage – Stored XSS to JS Backdoor Creation – POC

Icegram Engage is a widely-used WordPress plugin that enables website owners to create and manage popups, opt-in forms, and other interactive features to enhance user engagement. With over 30,000 active installations, the plugin is trusted by many to boost conversions and improve user experience. However, a critical vulnerability—CVE-2024-13482—has been discovered in the plugin. This stored Cross-Site Scripting (XSS) vulnerability allows an attacker to inject malicious JavaScript code into the plugin settings, which can lead to account takeover and the creation of a backdoor in the WordPress site.

CVE-2024-13486- Icegram Engage – Stored XSS to JS Backdoor Creation – POC

CVE-2024-13486- Icegram Engage – Stored XSS to JS Backdoor Creation – POC

Icegram Engage is a popular WordPress plugin designed to create popups, opt-in forms, and other interactive elements to engage visitors. With over 30,000 active installations, it is widely used to enhance user experience on WordPress sites. However, a critical vulnerability (CVE-2024-13486) has been identified within the plugin that allows an attacker to execute stored Cross-Site Scripting (XSS) attacks. This vulnerability can be exploited by attackers to inject malicious JavaScript code, potentially leading to backdoor creation and unauthorized account takeover.

CVE-2024-11272 – Contact Form & SMTP Plugin for WordPress by PirateForms – Stored XSS to JS Backdoor Creation – POC

CVE-2024-11272 – Contact Form & SMTP Plugin for WordPress by PirateForms – Stored XSS to JS Backdoor Creation – POC

The Contact Form & SMTP Plugin for WordPress by PirateForms is widely used to add customizable contact forms and SMTP email configurations to WordPress sites. With over 50,000 active installations, the plugin provides a convenient solution for website owners to manage user interactions. However, a critical vulnerability (CVE-2024-11272) has been discovered in the plugin that exposes WordPress sites to a serious security risk. The vulnerability allows attackers to inject malicious JavaScript into the plugin’s settings via the “Submit button” field. This can lead to account takeover, backdoor creation, and a wide range of other security risks.

CVE-2024-11273 – Contact Form & SMTP Plugin for WordPress by PirateForms – Stored XSS to JS Backdoor Creation – POC

CVE-2024-11273 – Contact Form & SMTP Plugin for WordPress by PirateForms – Stored XSS to JS Backdoor Creation – POC

The Contact Form & SMTP Plugin for WordPress by PirateForms is widely used to implement contact forms and handle email submissions through SMTP. With over 50,000 active installations, this plugin offers a simple and efficient way to manage user inquiries. However, a critical vulnerability—CVE-2024-11273—has been discovered in the plugin, which allows for Stored Cross-Site Scripting (XSS) attacks. This flaw enables attackers to inject malicious JavaScript code into the plugin’s settings, leading to the creation of backdoors and allowing attackers to take over admin accounts.

CVE-2024-12769 – Simple Banner – Stored XSS to JS Backdoor Creation – POC

CVE-2024-12769 – Simple Banner – Stored XSS to JS Backdoor Creation – POC

The Simple Banner plugin is a popular WordPress plugin used by website owners to display customizable banners at the top of their pages. With over 50,000 active installations, the plugin allows users to manage and configure banner content easily. While the plugin provides useful features, a critical vulnerability—CVE-2024-12769—was discovered during testing, which allows attackers to inject malicious JavaScript (JS) into the banner settings. This vulnerability enables attackers to execute stored XSS attacks, ultimately leading to the creation of a backdoor and account takeover by an attacker. This security flaw underscores the importance of input validation and sanitization, especially for plugins that manage dynamic content.

CVE-2024-10679 – Quiz and Survey Master (QSM) – Stored XSS to Admin Account Creation – POC

CVE-2024-10679 – Quiz and Survey Master (QSM) – Stored XSS to Admin Account Creation – POC

Quiz and Survey Master (QSM) is a popular WordPress plugin used by website owners and content creators to design and implement quizzes, surveys, and polls on their websites. With over 50,000 active installations, it provides a versatile platform for gathering feedback and engaging users. However, a critical vulnerability—CVE-2024-10679—has been identified in the plugin that exposes WordPress sites to a serious risk. The vulnerability allows attackers to execute a Stored Cross-Site Scripting (XSS) attack via the plugin’s settings, enabling attackers to escalate privileges and create an admin account. This vulnerability is particularly dangerous because it allows attackers to exploit low-level user roles, such as contributors, to gain full control over the WordPress site.

CVE-2024-10560 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

CVE-2024-10560 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

Form Maker by 10Web is a popular WordPress plugin that allows users to create custom forms for their websites. With over 50,000 active installations, it’s used widely for collecting data, including user registrations, feedback, and other forms of submission. However, a critical vulnerability, CVE-2024-10560, has been discovered within the plugin. This stored Cross-Site Scripting (XSS) vulnerability allows attackers to inject and execute malicious JavaScript in a form’s description field. Once this script is executed, it enables attackers to gain control over the site by creating backdoors, potentially escalating privileges to admin-level access.