WordPress is one of the most popular content management systems, powering millions of websites worldwide. Plugins enhance its functionality but can also introduce security vulnerabilities. One such case is the Prisna GWT plugin, which allows automatic translation using Google’s services. A stored cross-site scripting (XSS) vulnerability (CVE-2024-12679) has been identified in this plugin, posing a risk to website security. This article explores the discovery, exploitation, and mitigation of this vulnerability.

CVECVE-2024-12679
PluginPrisna GWT < 1.4.14
CriticalHigh
All Time327 638
Active installations10 000+
Publicly PublishedMarch 17, 2025
Last UpdatedMarch 17, 2025
ResearcherArtyom Krugov
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12679
https://wpscan.com/vulnerability/7ca1438f-4269-4e34-be4a-766276a9f016/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

November 17, 2024Plugin testing and vulnerability detection in the Prisna GWT have been completed
November 17, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 17, 2025Registered CVE-2024-12679

Discovery of the Vulnerability

Security researchers identified a stored XSS vulnerability in the Prisna GWT plugin, specifically in the “Exclude selector (jQuery)” field under the Advanced tab of the plugin’s settings panel. By injecting a malicious script, attackers could execute JavaScript in the browser of an unsuspecting user, leading to session hijacking, phishing, or defacement attacks.

Understanding of XSS attack’s

Stored XSS occurs when user-supplied input is stored in the database and later executed in the browser of users viewing the affected page. Unlike reflected XSS, which requires a victim to click on a malicious link, stored XSS does not require user interaction, making it more dangerous.

Consider an administrator who configures the Prisna GWT plugin with the aforementioned payload. Every visitor who loads a translated page may execute the injected script unknowingly, allowing an attacker to steal authentication cookies or redirect users to malicious sites.

Exploiting the XSS Vulnerability

To reproduce the vulnerability, the following steps can be taken:

POC:

1) Navigate to the WordPress admin panel.
2) Access the Plugins section and select "Prisna GWT".
3) Open the Advanced tab in the settings panel.
4) Insert the following malicious payload into the "Exclude selector (jQuery)" field
5) Save the settings and trigger the payload by visiting a translated page.

____

Recommendations for Improved Security

To mitigate this vulnerability, users and developers should take the following steps:

  • Update to the latest version: Ensure that you are using a patched version of the Prisna GWT plugin.
  • Sanitize Inputs: Avoid using untrusted input in plugin settings fields.
  • Implement a Web Application Firewall (WAF): Solutions like Wordfence can help block XSS payloads.

To prevent this type of attacks vendor used our methods of prevention.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-13616, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Artyom k.
CVE-2024-12679 – Prisna GWT for WordPress – Stored XSS to JS Backdoor Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *