CVE-2024-3261 exposes a critical vulnerability within the Strong Testimonials plugin, allowing attackers to execute Stored XSS attacks, thereby compromising admin accounts. Understanding its implications and securing WordPress installations becomes paramount.

Main info:

CVECVE-2024-3261
PluginStrong Testimonials < 3.1.12
CriticalHigh
All Time3 226 627
Active installations100 000+
Publicly PublishedMarch 25, 2023
Last UpdatedMarch 25, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3261
https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/
Plugin Security Certification by CleanTalk

Timeline

March 18, 2024Plugin testing and vulnerability detection in the Strong Testimonials plugin have been completed
January 18, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
March 25, 2024Registered CVE-2024-3261

Discovery of the Vulnerability

During rigorous plugin testing, researchers uncovered a flaw in Strong Testimonials, enabling malicious actors to inject JavaScript code through testimonials. This exploit facilitated admin account creation through Stored XSS.

Understanding of Stored XSS attack’s

During rigorous plugin testing, researchers uncovered a flaw in Strong Testimonials, enabling malicious actors to inject JavaScript code through testimonials. This exploit facilitated admin account creation through Stored XSS.

Exploiting the Stored XSS Vulnerability

In the case of CVE-2024-3261, attackers craft testimonials containing malicious JavaScript code. Upon rendering, the injected code triggers, enabling unauthorized admin account creation. Attackers can exploit this flaw by crafting seemingly harmless testimonials with malicious payloads.

POC:

Create a new Testimonial and intercept request. Put payload to “Full Name” field – 123″onmouseover=’alert(1)’. For PoC you should create a view of Testimonials and change “Display Type” to “link(must be URL type)” in “Custom Field” setting

___

In the case of CVE-2024-3261, attackers craft testimonials containing malicious JavaScript code. Upon rendering, the injected code triggers, enabling unauthorized admin account creation. Attackers can exploit this flaw by crafting seemingly harmless testimonials with malicious payloads.

Recommendation

To mitigate the risk posed by CVE-2024-3261 and similar vulnerabilities:

  • Update the Strong Testimonials plugin to the latest secure version immediately.
  • Regularly audit and sanitize user inputs to prevent XSS vulnerabilities.
  • Implement strict content security policies (CSP) to mitigate the impact of XSS attacks.
  • Educate users and administrators about the risks of XSS and encourage best practices for secure coding and plugin usage.

Stay vigilant and proactive in safeguarding your WordPress site against emerging threats like CVE-2024-3261. Your website’s security is paramount, so take action now to prevent potential exploitation.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.
CVE-2024-3261 – Strong Testimonials – Stored XSS to Admin Account Creation (Contributor+) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *