CVE-2024-3188 exposes a critical vulnerability in Shortcodes Ultimate plugin with 600 000 installations, threatening WordPress sites with Stored XSS attacks. This flaw enables contributors to execute malicious JavaScript, paving the way for admin account creation and subsequent site compromise.
CVE | CVE-2024-3188 |
Plugin | Shortcodes Ultimate < 7.0.5 |
Critical | Very High |
All Time | 19 068 645 |
Active installations | 600 000+ |
Publicly Published | April 15, 2023 |
Last Updated | April 15, 2023 |
Researcher | Dmtirii Ignatyev |
OWASP TOP-10 | A7: Cross-Site Scripting (XSS) |
PoC | Yes |
Exploit | No |
Reference | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3188 https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/ |
Plugin Security Certification by CleanTalk | |
Timeline
April 1, 2024 | Plugin testing and vulnerability detection in the Shortcodes Ultimate have been completed |
April 1, 2024 | I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing |
April 15, 2024 | Registered CVE-2024-3188 |
Discovery of the Vulnerability
During rigorous plugin testing, the vulnerability came to light, revealing an exploitable loophole in Shortcodes Ultimate. Through crafted input in new posts, contributors gain unauthorized access, breaching site security.
Understanding of Stored XSS attack’s
Stored XSS vulnerabilities pose a severe threat to WordPress, allowing attackers to inject malicious scripts into site content. With unsuspecting users triggering these scripts, attackers exploit their privileges to execute harmful actions.
Exploiting the Stored XSS Vulnerability
Utilizing the POC provided, malevolent actors embed malicious JavaScript within shortcode parameters. Upon execution, this code triggers unauthorized actions, such as admin account creation, leading to site compromise.
POC:
[su_dailymotion url=’123″onmouseover=”MALICIOUS_FUNC_HERE”‘]
____
The ramifications of CVE-2024-3188 are dire, with potential outcomes including data theft, defacement, and site takeover. Attackers can exploit compromised admin accounts to perpetrate further attacks, posing a significant risk to site integrity and user data.
Recommendations for Improved Security
To mitigate the risk posed by CVE-2024-3188, WordPress site administrators are urged to promptly update Shortcodes Ultimate to the latest patched version. Additionally, implementing robust input validation and security measures can fortify defenses against future vulnerabilities.
By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-2583, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.
#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #VeryHighVulnerability
Use CleanTalk solutions to improve the security of your website
DMITRII I.