The digital world is rife with threats, and the latest discovery in the WordPress plugin landscape underscores this reality. “Shortcodes Ultimate Pro,” a popular plugin with over 500,000 installations, has been found vulnerable to a severe security flaw, CVE-2024-6766. This vulnerability exposes websites to significant risks, impacting both their integrity and the safety of user data.

CVECVE-2024-6766
PluginShortcodes Ultimate Pro < 7.2.1
CriticalHigh
All Time21 406 000
Active installations500 000+
Publicly PublishedJuly 15, 2024
Last UpdatedJuly 15, 2024
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6766
https://wpscan.com/vulnerability/77bb1dcf-4e84-497a-955e-f3c0b649ad1c/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

June 11, 2024Plugin testing and vulnerability detection in the Shortcodes Ultimate Pro have been completed
June 11, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
July 15, 2024Registered CVE-2024-6766

Discovery of the Vulnerability

The flaw was uncovered during routine security assessments aimed at bolstering defenses against cyber threats. It manifests as a Stored Cross-Site Scripting (XSS) vulnerability, a common but dangerous exploit that can lead to unauthorized administrative access and potentially catastrophic consequences for website operations.

Understanding of Stored XSS attack’s

Stored XSS attacks are particularly insidious because they allow the injection of malicious scripts into web pages that are subsequently saved and displayed to other users. In WordPress, where plugins extend functionality, such vulnerabilities can severely undermine the security of a site. Real-world examples include instances where attackers have manipulated these flaws to steal cookies, hijack sessions, or redirect visitors to malicious websites.

Exploiting the Stored XSS Vulnerability

In the case of Shortcodes Ultimate Pro, the vulnerability can be exploited by embedding malicious JavaScript in the ‘btn_background’ attribute of the [su_plan] shortcode. When a user with sufficient privileges interacts with this tainted element, the script executes, paving the way for unauthorized actions such as admin account creation.

POC:

[su_plan name=”1″ price=”1″ before=”1″ after=”1″ period=”1″ background=”1″ color=”1″ icon_color=”1″ icon_size=”128″ btn_url=”1″ btn_text=”1″ btn_background=’123″onmouseover=”alert(1)//”‘ btn_color=”1″ class=”1″]1[/su_plan]

____

The risks associated with this vulnerability are profound. Beyond unauthorized access, attackers could potentially escalate privileges, extract sensitive data, plant backdoors, or spread malware to users. In real-world scenarios, such breaches could lead to data theft, website defacement, or even a complete takeover of the website’s administrative functions.

Recommendations for Improved Security

To mitigate this vulnerability and enhance overall security, users of the Shortcodes Ultimate Pro plugin should:

  1. Immediately update the plugin to the latest version if a security patch is available.
  2. Regularly review and sanitize inputs across all forms and content blocks to prevent script injections.
  3. Implement a robust Content Security Policy (CSP) that restricts the sources from which scripts can be loaded.
  4. Educate users with administrative privileges about the risks of XSS and the importance of secure coding practices.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-6766, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #VeryHighVulnerability

Use CleanTalk solutions to improve the security of your website

ARTYOM K.
CVE-2024-6766 – Shortcodes Ultimate Pro – Stored XSS to Admin Account Creation (Contributor+) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *