A critical vulnerability, CVE-2024-2118, threatens WordPress sites using Social Media Share Buttons. This flaw enables malicious actors to execute Stored XSS attacks, opening the door to account takeovers and backdoor creation. (if an attacker has previously hijacked an administrator or editor account, he can plant a backdoor to regain access back).

Main info:

CVECVE-2024-2118
PluginSocial Media Share Buttons < 2.8.9
CriticalHigh
All Time11 067 645
Active installations100 000+
Publicly PublishedMarch 29, 2023
Last UpdatedMarch 29, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2118
https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/
Plugin Security Certification by CleanTalk

Timeline

February 20, 2024Plugin testing and vulnerability detection in the Social Media Share Buttons plugin have been completed
February 20, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 29, 2024Registered CVE-2024-2118

Discovery of the Vulnerability

Discovered during routine plugin testing, CVE-2024-2118 exposes a vulnerability in the Social Media Share Buttons plugin. Attackers can leverage this flaw to inject malicious scripts, compromising site integrity and user security.

Understanding of Stored XSS attack’s

Discovered during routine plugin testing, CVE-2024-2118 exposes a vulnerability in the Social Media Share Buttons plugin. Attackers can leverage this flaw to inject malicious scripts, compromising site integrity and user security.

Exploiting the Sensitive Data Exposure Vulnerability

By manipulating plugin settings, attackers can inject malicious payloads into fields intended for user-provided content. In the case of Social Media Share Buttons, altering the “Visit my Facebook page at” field with a crafted payload facilitates XSS execution.

POC:

You should click on “Ultimate Social Media Icons” and change “Visit my Facebook page at” field to (https://asd”onmouseover=alert(112312)//) -> Save Settings

____

The CVE-2024-2118 vulnerability poses significant risks to website owners and users. Attackers can exploit the flaw to execute arbitrary code, compromise user accounts, and plant persistent backdoors, leading to data breaches, site defacement, and reputational damage.

Recommendations for Improved Security

To mitigate the risk posed by CVE-2024-2118, website administrators should promptly update the Social Media Share Buttons plugin to the latest secure version. Additionally, implementing robust input validation and output encoding practices can fortify defenses against XSS vulnerabilities. Regular security audits and timely patching are crucial for safeguarding WordPress sites against emerging threats.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-2118, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #VeryHighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.
CVE-2024-2118 – Social Media Share Buttons – Stored XSS to JS backdoor creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *