A critical security vulnerability, CVE-2024-1331, has been uncovered in the Team Members plugin for WordPress. This flaw, a Stored Cross-Site Scripting (XSS) vulnerability, allows attackers to execute malicious scripts on behalf of contributors, potentially leading to account takeover and compromising the security of WordPress sites.

Main info:

CVECVE-2024-1331
PluginTeam Members < 5.3.2
CriticalHigh
All Time610 694
Active installations30 000+
Publicly PublishedFebruary 20, 2023
Last UpdatedFebruary 20, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1331
https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/
Plugin Security Certification by CleanTalk

Timeline

February 5, 2023Plugin testing and vulnerability detection in the Team Members have been completed
February 5, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
February 20, 2024Registered CVE-2024-1331

Discovery of the Vulnerability

During routine testing of the Team Members plugin, security researchers identified a vulnerability that enables the injection of malicious code via the “Link URL” field when adding a new team member. This flaw exposes WordPress sites to the risk of Stored XSS attacks, posing a significant security threat.

Understanding of Stored XSS attack’s

Stored XSS vulnerabilities occur when user-supplied input is stored on a server and later displayed on a web page without proper sanitization. In the case of WordPress plugins like Team Members, attackers can exploit this vulnerability by injecting malicious JavaScript code into input fields. When unsuspecting users view the affected content, the injected script executes in their browsers.

Exploiting the Stored XSS Vulnerability

To exploit the CVE-2024-1331 vulnerability, attackers need to navigate to the Team Members plugin’s “Add New Team” section and insert the malicious payload into the “Link URL” field while adding a new team member. The injected script will then execute whenever the affected content is viewed, potentially leading to account takeover or other malicious activities.

POC:

  1. You should click on Add New Team and add new member. Fill all Form with valid names and put (” onmouseover=’alert(1)’) to “Link URL” field. After that put shortcode to new post of somewhere else.

___

The presence of Stored XSS vulnerabilities in WordPress plugins like Team Members can have severe consequences. Attackers can leverage these vulnerabilities to steal sensitive user data, deface websites, distribute malware, or launch phishing attacks. Furthermore, compromised websites may suffer reputational damage and loss of user trust.

Recommendations for Improved Security

To mitigate the risk associated with CVE-2024-1331 and similar vulnerabilities, WordPress site administrators are advised to:

  • Update the Team Members plugin to the latest patched version.
  • Regularly audit and monitor WordPress plugins for security vulnerabilities.
  • Implement input validation and output sanitization techniques to prevent XSS attacks.
  • Educate users about the risks of clicking on suspicious links or executing unknown scripts on WordPress sites.
  • Consider employing web application firewalls (WAFs) and security plugins to enhance website security posture.

By following these recommendations, website administrators can strengthen the security of their WordPress websites and reduce the risk of exploitation through Stored XSS vulnerabilities in plugins like Team Members.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.
CVE-2024-1331 – Team Members – Stored XSS (Author+) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *