A critical vulnerability, CVE-2024-2309, has been discovered in the WP Staging WordPress plugin, exposing websites to Stored Cross-Site Scripting (XSS) attacks. This flaw allows attackers to execute malicious scripts, potentially leading to the creation of JavaScript backdoors and compromising website integrity. Immediate action is advised to mitigate the risk. This vulnerability allows malicious actors to execute Stored XSS attacks, potentially leading to the creation of JavaScript backdoors, compromising website integrity. (if an attacker has previously hijacked an administrator or editor account, he can plant a backdoor to regain access back).

Main info:

CVECVE-2024-2309
PluginWP Staging (Free < 3.4.0, Pro < 5.4.0)
CriticalHigh
All Time3 127 121
Active installations90 000+
Publicly PublishedMarch 25, 2023
Last UpdatedMarch 25, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2309
https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/
Plugin Security Certification by CleanTalk

Timeline

February 16, 2023Plugin testing and vulnerability detection in the WP Staging plugin have been completed
February 16, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 25, 2024Registered CVE-2024-2309

Discovery of the Vulnerability

During routine security testing of the WP Staging plugin, security researchers uncovered a vulnerability that enables attackers to execute Stored XSS attacks. By embedding malicious scripts in certain plugin settings, attackers can exploit this flaw to compromise website security.

Understanding of Stored XSS attack’s

Stored Cross-Site Scripting (XSS) vulnerabilities occur when user-supplied data is improperly stored and later executed within the context of a web application. In WordPress, this often involves injecting malicious scripts into plugin settings or user-generated content, which can then be executed by unsuspecting users.

Exploiting the Stored XSS Vulnerability

To exploit CVE-2024-2309, attackers can navigate to the “Backup & Migration” section of the WP Staging plugin and manipulate the “Backup Name” field to include malicious script code. This code is then executed when the compromised settings are accessed, leading to potential account takeover or backdoor creation.

POC:

You should click on “Backup & Migration” and change “Backup Name” field to (123123″ onmouseover=’alert(1)’) -> Save

___

The exploitation of this vulnerability poses significant risks to website owners and users. Attackers can use the stored XSS attack vector to steal sensitive information, perform unauthorized actions, or even distribute malware. Real-world scenarios include compromised admin accounts, defaced websites, and data breaches.

Recommendation

To mitigate the risk associated with CVE-2024-2309, website administrators are advised to update the WP Staging plugin to the latest patched version immediately. Additionally, implementing strict input validation and output encoding practices can help prevent XSS vulnerabilities. Regular security audits and monitoring can also help detect and address security issues proactively.

Stay vigilant and proactive in safeguarding your WordPress site against emerging threats like CVE-2024-2309. Your website’s security is paramount, so take action now to prevent potential exploitation.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.

Create your CleanTalk account



By signing up, you agree with license. Have an account? Log in.
CVE-2024-2309 – WP Staging – Stored XSS to JS backdoor creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *