A critical vulnerability, CVE-2024-1849, has been unearthed in WP Customer Reviews, posing a significant threat to WordPress websites. This flaw enables attackers to orchestrate malicious redirects, potentially leading to severe consequences for site owners and users alike.

Main info:

CVECVE-2024-1849
PluginWP Customer Reviews < 3.7.1
CriticalHigh
All Time1 172 510
Active installations30 000+
Publicly PublishedMarch 25, 2023
Last UpdatedMarch 25, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A1: Injection
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1849
https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/
Plugin Security Certification by CleanTalk

Timeline

February 14, 2023Plugin testing and vulnerability detection in the WP Customer Reviews plugin have been completed
February 14, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 25, 2024Registered CVE-2024-1849

Discovery of the Vulnerability

During rigorous testing of the plugin’s functionalities, security researchers stumbled upon a loophole that permits attackers to inject malicious code, thus facilitating unauthorized redirects. This vulnerability, observed in instances where users possess Contributor+ privileges, underscores the pressing need for heightened vigilance in WordPress security protocols.

Understanding of Malicious Redirect attack’s

Malicious redirects represent a common tactic employed by cybercriminals to reroute unsuspecting users to harmful or fraudulent websites. By exploiting vulnerabilities within WordPress plugins, attackers can surreptitiously insert code snippets that trigger automatic redirection, thereby compromising the integrity and safety of the affected sites.

Exploiting the Malicious Redirect Vulnerability

The POC (Proof of Concept) for CVE-2024-1849 elucidates the simplicity with which attackers can execute malicious redirects. By leveraging the vulnerability within WP Customer Reviews, malevolent actors can inject malicious code into specific fields, such as the “Business Name,” thereby initiating unauthorized redirects to potentially harmful destinations.

POC:

1) Create new Post

2) In bottom of the page put in “Buissnes Name” field this text – (0;http://smth.me/” HTTP-EQUIV=”refresh” a=”a)

___

The ramifications of this vulnerability are far-reaching, with the potential to inflict significant harm on both website owners and visitors. Malicious redirects can lead to the dissemination of malware, phishing attacks, or exposure to fraudulent schemes, resulting in reputational damage, financial losses, and compromised user data.

Recommendations for Improved Security

To mitigate the risk posed by CVE-2024-1849 and similar vulnerabilities, website owners are urged to promptly update their WP Customer Reviews plugin to the latest patched version. Additionally, implementing robust security measures such as regular security audits, strict access controls, and web application firewalls can fortify defenses against potential threats, safeguarding WordPress sites and their users from exploitation.

Stay vigilant and proactive in safeguarding your WordPress site against emerging threats like CVE-2024-1849. Your website’s security is paramount, so take action now to prevent potential exploitation.

#WordPressSecurity #MaliciousRedirect #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.
CVE-2024-1849 – WP Customer Reviews – Malicious Redirect via HTTP-EQUIV Injection – POC

Leave a Reply

Your email address will not be published. Required fields are marked *