CVE-2024-10362 exposes a Stored Cross-Site Scripting (XSS) vulnerability in the Ultimate Social Media Icons WordPress plugin. This popular plugin allows WordPress site administrators to display customizable social media icons, enabling visitors to share content across platforms like Facebook, Twitter, LinkedIn, and more. Unfortunately, a flaw in its handling of user inputs can permit attackers to inject malicious JavaScript code, paving the way for serious security risks. This article explores how the vulnerability was discovered, the potential impact on WordPress sites, and practical steps to protect against such attacks.

CVECVE-2024-8670
PluginSocial Media Share Buttons < 2.9.0
CriticalLow
All Time18 517 783
Active installations100 000+
Publicly PublishedApril 29, 2024
Last UpdatedApril 29, 2024
ResearcherArtyom Krugov
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10362
https://wpscan.com/vulnerability/701f653b-a0c3-49b4-972e-f26c3633ad92/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

April 29, 2024Plugin testing and vulnerability detection in the  Social Media Share Buttons have been completed
April 29, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
October 4, 2024Registered CVE-2024-10362

Discovery of the Vulnerability

The vulnerability in the Ultimate Social Media Icons plugin was identified in its Optional settings section, particularly within the “Any other wishes for your main icons” tab. By manipulating this setting, attackers can exploit the sfsi_facebook_icons_language parameter to inject harmful code. If left unpatched, this vulnerability enables persistent XSS attacks, meaning that injected code will be saved in the site’s database and executed whenever the vulnerable icons are loaded on a page. This discovery highlights a critical security gap, making the plugin susceptible to backdoor creation and other forms of malicious exploitation.

Understanding of XSS attack’s

Stored XSS vulnerabilities are particularly hazardous because they embed malicious scripts within a site’s backend, ready to execute whenever the infected component loads. In WordPress, plugins that accept user-generated input without adequate sanitization are common sources of such vulnerabilities.

For instance, similar vulnerabilities have appeared in various WordPress plugins over the years, allowing attackers to execute commands, steal user sessions, and hijack administrative accounts. When a stored XSS attack is successful, it can lead to unauthorized access to sensitive data, redirection of users to malicious websites, or insertion of harmful scripts across multiple pages, making it a potent attack vector.

Exploiting the XSS Vulnerability

To exploit CVE-2024-10362, an attacker would need access to the admin panel of a WordPress site with the Ultimate Social Media Icons plugin installed. Here’s a step-by-step breakdown of the exploitation process:

  1. Access Optional Settings: In the WordPress admin panel, navigate to the Ultimate Social Media Icons plugin settings.
  2. Navigate to Customization Tab: Go to the “Any other wishes for your main icons” tab under Optional Settings.
  3. Intercept Request: Using a tool like Burp Suite, intercept the request containing the sfsi_facebook_icons_language parameter.
  4. Inject Payload: Insert the following payload into the sfsi_facebook_icons_language parameter: 123123\\”onerror=alert(/XSS/)//
  5. Save Settings and Trigger Execution: Save the settings and return to a page containing the social media icons to witness the payload execution, confirming the stored XSS vulnerability.

____

Recommendations for Improved Security

To mitigate the risks associated with CVE-2024-10362, both WordPress administrators and plugin developers can take proactive steps:

  1. Implement Strong Input Sanitization: Plugin developers should ensure that all inputs, particularly those accepting user-generated code or customizations, are properly sanitized and validated.
  2. Regular Plugin Updates: Site administrators should stay up to date with plugin updates and patches, as developers often release security fixes in response to vulnerabilities.
  3. Restrict Access Permissions: Limit access to critical plugin settings to trusted users only, ensuring that unauthorized individuals cannot manipulate configurations.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-10362, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #Vulnerability

Use CleanTalk solutions to improve the security of your website

Artyom k.
CVE-2024-10362 – Social Media Share Buttons – Stored XSS to Backdoor Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *