A critical vulnerability, CVE-2024-1846, uncovered in Responsive Tabs for WordPress, has raised alarms. Exploiting a Stored XSS flaw, attackers can manipulate posts to create admin accounts, potentially compromising entire sites.
Main info:
CVE | CVE-2024-1846 |
Plugin | Responsive Tabs < 4.0.7 |
Critical | High |
All Time | 121 030 |
Active installations | 6 000+ |
Publicly Published | March 25, 2023 |
Last Updated | March 25, 2023 |
Researcher | Dmtirii Ignatyev |
OWASP TOP-10 | A7: Cross-Site Scripting (XSS) |
PoC | Yes |
Exploit | No |
Reference | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1846 https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/ |
Plugin Security Certification by CleanTalk | |
Timeline
February 05, 2023 | Plugin testing and vulnerability detection in the Responsive Tabs plugin have been completed |
February 05, 2023 | I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing |
March 25, 2024 | Registered CVE-2024-1846 |
Discovery of the Vulnerability
During routine plugin testing, a security flaw was unearthed in Responsive Tabs. The vulnerability, present in the “tabs_color” field, allows contributors to inject malicious JavaScript code into new posts.
Understanding of Stored XSS attack’s
Stored XSS vulnerabilities enable attackers to inject malicious scripts into web applications, which are then executed in the browsers of unsuspecting users who access the affected content. In WordPress, this can be exploited via input fields, allowing attackers to hijack sessions, deface websites, or even gain administrative access.
Exploiting the Stored XSS Vulnerability
To exploit CVE-2024-1846, attackers insert crafted JavaScript code into the “tabs_color” field while adding new tabs. When unsuspecting users view these posts containing the malicious code, the script executes, enabling attackers to create admin accounts.
POC:
You should click on “Add New Tabs” and add new tab. Fill all Form with valid names and put (” onmouseover=’alert(1)’) to “tabs_color” field. After that put shortcode to new post or somewhere else.
___
This vulnerability poses significant risks, including unauthorized access to sensitive data, website defacement, and complete system compromise. Attackers could leverage admin privileges to inject malicious content, distribute malware, or launch further attacks.
Recommendations for Improved Security
To mitigate the risk posed by CVE-2024-1846 and similar vulnerabilities:
- Update Responsive Tabs to the latest version immediately.
- Regularly scan WordPress plugins for vulnerabilities.
- Implement strict input validation and output encoding practices.
- Educate users about the dangers of executing untrusted scripts.
- Monitor website activity for suspicious behavior and promptly investigate any anomalies.
Stay vigilant and proactive in safeguarding your WordPress site against emerging threats like CVE-2024-1846. Your website’s security is paramount, so take action now to prevent potential exploitation.
#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability
Use CleanTalk solutions to improve the security of your website
DMITRII I.