A critical vulnerability, CVE-2024-1846, uncovered in Responsive Tabs for WordPress, has raised alarms. Exploiting a Stored XSS flaw, attackers can manipulate posts to create admin accounts, potentially compromising entire sites.

Main info:

CVECVE-2024-1846
PluginResponsive Tabs < 4.0.7
CriticalHigh
All Time121 030
Active installations6 000+
Publicly PublishedMarch 25, 2023
Last UpdatedMarch 25, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1846
https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/
Plugin Security Certification by CleanTalk

Timeline

February 05, 2023Plugin testing and vulnerability detection in the Responsive Tabs plugin have been completed
February 05, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 25, 2024Registered CVE-2024-1846

Discovery of the Vulnerability

During routine plugin testing, a security flaw was unearthed in Responsive Tabs. The vulnerability, present in the “tabs_color” field, allows contributors to inject malicious JavaScript code into new posts.

Understanding of Stored XSS attack’s

Stored XSS vulnerabilities enable attackers to inject malicious scripts into web applications, which are then executed in the browsers of unsuspecting users who access the affected content. In WordPress, this can be exploited via input fields, allowing attackers to hijack sessions, deface websites, or even gain administrative access.

Exploiting the Stored XSS Vulnerability

To exploit CVE-2024-1846, attackers insert crafted JavaScript code into the “tabs_color” field while adding new tabs. When unsuspecting users view these posts containing the malicious code, the script executes, enabling attackers to create admin accounts.

POC:

You should click on “Add New Tabs” and add new tab. Fill all Form with valid names and put (” onmouseover=’alert(1)’) to “tabs_color” field. After that put shortcode to new post or somewhere else.

___

This vulnerability poses significant risks, including unauthorized access to sensitive data, website defacement, and complete system compromise. Attackers could leverage admin privileges to inject malicious content, distribute malware, or launch further attacks.

Recommendations for Improved Security

To mitigate the risk posed by CVE-2024-1846 and similar vulnerabilities:

  1. Update Responsive Tabs to the latest version immediately.
  2. Regularly scan WordPress plugins for vulnerabilities.
  3. Implement strict input validation and output encoding practices.
  4. Educate users about the dangers of executing untrusted scripts.
  5. Monitor website activity for suspicious behavior and promptly investigate any anomalies.

Stay vigilant and proactive in safeguarding your WordPress site against emerging threats like CVE-2024-1846. Your website’s security is paramount, so take action now to prevent potential exploitation.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.
CVE-2024-1846 – Responsive Tabs – Stored XSS to Admin Account Creation (Contributor+) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *