Progressive Web Apps (PWAs) have revolutionized the way websites interact with users, offering a mobile app-like experience directly from the web. One popular WordPress plugin, “PWA For WP & AMP,” integrates this advanced technology into WordPress sites, promising seamless offline support, app-like user interfaces, and faster loading times. However, with the increasing adoption of such technologies, security concerns have also grown. Recently, a significant vulnerability—CVE-2024-7759—was discovered in the “PWA For WP & AMP” plugin, posing a serious risk to website administrators and users alike.

CVECVE-2024-3901
PluginPWA for WP & AMP
CriticalLow
All Time1 319 716
Active installations20 000+
Publicly PublishedJuly 3, 2024
Last UpdatedJuly 3, 2024
ResearcherArtyom Krugov
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7759/
https://wpscan.com/vulnerability/6e495b39-f9ef-45dd-b839-65c71a082f2b/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

July 3, 2024Plugin testing and vulnerability detection in the PWA for WP & AMP have been completed
July 3, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
August 28, 2024Registered CVE-2024-7759

Discovery of the Vulnerability

During a routine security assessment of the “PWA For WP & AMP” plugin, a stored Cross-Site Scripting (XSS) vulnerability was uncovered. This vulnerability allows attackers to inject malicious scripts into the website on behalf of an administrator, leading to potential account hijacking. The flaw was identified in the plugin’s settings interface, specifically within the unsanitized pwaforwp_settings[normal_enable] parameter.

Understanding of Stored XSS attack’s

Stored XSS attacks are particularly dangerous within WordPress because they allow attackers to inject malicious scripts into web pages viewed by other users. These scripts can steal cookies, hijack sessions, or redirect victims to malicious websites. This type of vulnerability is notorious within web applications and has been exploited in numerous plugins, underscoring the need for rigorous input sanitization.

Exploiting the Stored XSS Vulnerability

To exploit the CVE-2024-7759 vulnerability in the “PWA For WP & AMP” plugin, follow these steps:

POC:

Access the PWA Control Panel: Begin by navigating to the PWA control panel within the WordPress dashboard.

Go to the Dashboard Tab: From the control panel, click on the “Dashboard” tab to access the plugin’s main settings page.

Intercept the Save Settings Request: Click on the “Save Settings” button while intercepting the request using a web proxy tool.

Identify the Vulnerable Parameter: In the intercepted request, locate the pwaforwp_settings[normal_enable] parameter, which lacks proper sanitization.

Inject the XSS Payload: Insert the following payload into the pwaforwp_settings[normal_enable] parameter

____

The risks associated with this vulnerability are significant. If exploited, attackers can gain administrative access, allowing them to alter site content, manipulate site functionality, and access sensitive user data. The potential for reputational damage and legal consequences is high, especially for business-oriented sites.

Recommendations for Improved Security

To mitigate this vulnerability, users are urged to update the Genesis Blocks plugin immediately upon release of a fix. Additionally, site administrators should regularly audit their plugins and themes for updates and potential vulnerabilities, employ robust input validation, and consider using web application firewalls (WAFs) to detect and block malicious input.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-7759, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #Vulnerability

Use CleanTalk solutions to improve the security of your website

ARTYOM K.
CVE-2024-7759 – PWA For WP & AMP – Stored XSS to Admin Account Creation – POC

Leave a Reply

Your email address will not be published. Required fields are marked *