A critical vulnerability, CVE-2024-2118, threatens WordPress sites using Social Media Share Buttons. This flaw enables malicious actors to execute Stored XSS attacks, opening the door to account takeovers and backdoor creation. (if an attacker has previously hijacked an administrator or editor account, he can plant a backdoor to regain access back).
Main info:
CVE | CVE-2024-2118 |
Plugin | Social Media Share Buttons < 2.8.9 |
Critical | High |
All Time | 11 067 645 |
Active installations | 100 000+ |
Publicly Published | March 29, 2023 |
Last Updated | March 29, 2023 |
Researcher | Dmtirii Ignatyev |
OWASP TOP-10 | A7: Cross-Site Scripting (XSS) |
PoC | Yes |
Exploit | No |
Reference | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2118 https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/ |
Plugin Security Certification by CleanTalk | |
Timeline
February 20, 2024 | Plugin testing and vulnerability detection in the Social Media Share Buttons plugin have been completed |
February 20, 2024 | I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing |
March 29, 2024 | Registered CVE-2024-2118 |
Discovery of the Vulnerability
Discovered during routine plugin testing, CVE-2024-2118 exposes a vulnerability in the Social Media Share Buttons plugin. Attackers can leverage this flaw to inject malicious scripts, compromising site integrity and user security.
Understanding of Stored XSS attack’s
Discovered during routine plugin testing, CVE-2024-2118 exposes a vulnerability in the Social Media Share Buttons plugin. Attackers can leverage this flaw to inject malicious scripts, compromising site integrity and user security.
Exploiting the Sensitive Data Exposure Vulnerability
By manipulating plugin settings, attackers can inject malicious payloads into fields intended for user-provided content. In the case of Social Media Share Buttons, altering the “Visit my Facebook page at” field with a crafted payload facilitates XSS execution.
POC:
You should click on “Ultimate Social Media Icons” and change “Visit my Facebook page at” field to (https://asd”onmouseover=alert(112312)//) -> Save Settings
____
The CVE-2024-2118 vulnerability poses significant risks to website owners and users. Attackers can exploit the flaw to execute arbitrary code, compromise user accounts, and plant persistent backdoors, leading to data breaches, site defacement, and reputational damage.
Recommendations for Improved Security
To mitigate the risk posed by CVE-2024-2118, website administrators should promptly update the Social Media Share Buttons plugin to the latest secure version. Additionally, implementing robust input validation and output encoding practices can fortify defenses against XSS vulnerabilities. Regular security audits and timely patching are crucial for safeguarding WordPress sites against emerging threats.
By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-2118, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.
#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #VeryHighVulnerability
Use CleanTalk solutions to improve the security of your website
DMITRII I.