A critical security flaw has been discovered in the widely-used WordPress plugin, All in One SEO with more then 3 millions installations, marked as CVE-2024-3368. This vulnerability poses a significant threat, allowing attackers to execute malicious code through Stored Cross-Site Scripting (XSS) attacks, potentially leading to the creation of admin accounts by contributors.
CVE | CVE-2024-3368 | |
Plugin | All in One SEO < 4.6.1.1 | |
Critical | Very High | |
All Time | 147 495 153 | |
Active installations | 3 000 000+ | |
Publicly Published | April 29, 2023 | |
Last Updated | April 29, 2023 | |
Researcher | Dmtirii Ignatyev | |
OWASP TOP-10 | A7: Cross-Site Scripting (XSS) | |
PoC | Yes | |
Exploit | No | |
Reference | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3368 https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/ | |
Plugin Security Certification by CleanTalk | | |
Logo of the plugin |
Timeline
April 3, 2024 | Plugin testing and vulnerability detection in the All in One SEO have been completed |
April 3, 2024 | I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing |
April 29, 2024 | Registered CVE-2024-3368 |
Discovery of the Vulnerability
During routine testing, security researchers identified a vulnerability in the All in One SEO plugin that enables contributors to execute arbitrary JavaScript code within the context of a WordPress post. This flaw grants unauthorized access to admin privileges, putting millions of websites at risk of compromise.
Understanding of Stored XSS attack’s
Stored XSS occurs when user-supplied data is stored on a server and later displayed on a web page without proper validation. In the case of WordPress, attackers can exploit this vulnerability by injecting malicious code into posts, comments, or metadata fields, leading to unauthorized actions or data theft.
Exploiting the Stored XSS Vulnerability
By leveraging the vulnerability in All in One SEO, attackers can craft a malicious post containing JavaScript code and inject it into the SEO section. When administrators or other users interact with the compromised content, the malicious script executes, potentially resulting in the creation of admin accounts, data theft, or further exploitation.
POC:
Create a new Post and add here “https://123.123″asdasd=”;alert(1);<img src=x onerror=alert(1)>” to the SEO section
____
With over 3 million active installations, the CVE-2024-3368 vulnerability in All in One SEO poses a severe risk to WordPress websites globally. Attackers could exploit this flaw to gain unauthorized access, deface websites, steal sensitive information, or distribute malware, causing significant harm to site owners and visitors.
Recommendations for Improved Security
To mitigate the risk posed by CVE-2024-3368 and similar vulnerabilities, WordPress site owners are urged to update the All in One SEO plugin to the latest patched version immediately. Additionally, regular security audits, robust access controls, and the implementation of web application firewalls (WAFs) can help safeguard against XSS attacks and other security threats.
By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-3368, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.
#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #VeryHighVulnerability
Use CleanTalk solutions to improve the security of your website
DMITRII I.
I don’t see the plug in in my account? Where is it?
Hello Albert,
Here is the guide to set up Security by CleanTalk https://cleantalk.org/help/install-wordpress-security
Does it work for you?
I don’t have this plugin on my site, why is it reported?
Hello Mariana,
Thank you for the great question!
We do not know the plugins list that you use on your website. In the same time All in One SEO is very popular plugin, that’s why we informed all users. Any way, if you use Security by CleanTalk we do our best to keep your site safe https://cleantalk.org/help/install-wordpress-security
Hallo Team,
hiermit kündige ich den Vertrag zum nächstmöglichen Termin.
Hello Thomas,
If you have questions about your account, please submit support request over here https://cleantalk.org/my/support/open