One of the latest vulnerabilities discovered is CVE-2024-7955, discovered in the popular Starbox plugin. This preserved XSS vulnerability poses a serious danger because it allows attackers to inject malicious scripts into a website, which could potentially lead to a complete account hijacking. In this article, we will take a detailed look at this vulnerability, its consequences, and the steps you can take to protect your WordPress site.

CVECVE-2024-7955
PluginStarbox < 3.5.2
CriticalLow
All Time477 585
Active installations30 000+
Publicly PublishedAugust 1, 2024
Last UpdatedAugust 1, 2024
ResearcherArtyom Krugov
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7955/
https://wpscan.com/vulnerability/cbfcbe57-553d-490a-b7f3-48aa0022f63d/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

August 6, 2024Plugin testing and vulnerability detection in the Starbox have been completed
August 6, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
August 23, 2024Registered CVE-2024-7955

Discovery of the Vulnerability

The vulnerability in the Starbox plugin was identified during routine security testing. The plugin, widely used for adding author boxes to posts, was found to have a critical flaw in its settings panel. Specifically, the parameters abh_titlefontsize and abh_descfontsize were vulnerable to Stored XSS attacks. This means that by exploiting these fields, an attacker could inject malicious scripts that would execute whenever the settings page or any page using these settings is loaded.

Understanding of Stored XSS attack’s

Stored Cross-Site Scripting (XSS) is a type of vulnerability where malicious scripts are injected into a web application and stored on the server. These scripts are then executed whenever a user visits the infected page. In the context of WordPress, Stored XSS can be particularly dangerous as it often leads to the execution of harmful code in the browser of anyone who views the affected content, including site administrators. This can result in unauthorized actions, such as changing settings, creating new admin accounts, or even stealing sensitive data.

Exploiting the Stored XSS Vulnerability

To exploit the CVE-2024-7955 vulnerability, an attacker needs to follow these steps:

POC:

Access the StarBox Plugin Settings:

  • Log in to your WordPress admin dashboard.
  • Navigate to the StarBox plugin settings panel.

Modify Vulnerable Parameters:

  • Within the settings panel, locate the fields for abh_titlefontsize and abh_descfontsize.
  • These fields are used to adjust the font sizes for the title and description in the author box.

Inject the Malicious Payload:

  • In either or both of the abh_titlefontsize and abh_descfontsize fields, input the following malicious script:
    1"test=' onmouseover=alert(779) test=' //

____

The risks associated with this vulnerability are high, primarily because it can be used to create a backdoor into the admin account of a WordPress site. Once exploited, an attacker could potentially take over the entire site, steal sensitive user data, and spread the attack further to visitors of the site.

Recommendations for Improved Security

To mitigate this vulnerability and enhance overall site security, it is recommended that:

  • Hijack Administrator Accounts: By executing malicious scripts, attackers can steal session tokens or cookies, allowing them to take over administrator accounts.
  • Compromise User Data: Accessing admin privileges could lead to unauthorized access to sensitive user data stored within the WordPress site.
  • Spread Malware: The attacker can inject additional scripts to distribute malware to site visitors, leading to a broader security breach.
  • Damage Reputation: A compromised site can suffer significant reputational damage, leading to loss of trust among users and visitors.

By taking proactive measures to address XSS vulnerabilities like CVE-2024-7955, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #XSS #WebsiteSafety #StayProtected #VeryHighVulnerability

Use CleanTalk solutions to improve the security of your website

ARTYOM K.
CVE-2024-7955 – Starbox – Stored XSS – POC

Leave a Reply

Your email address will not be published. Required fields are marked *