Stored Cross-Site Scripting Vulnerability in WordPress Core
CVE-2024-4439
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 3 May 2024
Badges
What is CVE-2024-4439?
CVE-2024-4439 is a stored cross-site scripting (XSS) vulnerability found in the WordPress Core, affecting multiple versions up to 6.5.2. This vulnerability arises from insufficient output escaping of user display names, specifically within the Avatar block. It allows authenticated users with contributor-level access or higher to inject malicious web scripts, which can be executed when other users access the affected pages. Furthermore, it poses a risk to unauthenticated attackers, who can exploit this vulnerability on pages containing a comment block, potentially compromising the security and integrity of web applications that rely on WordPress.
Technical Details
The vulnerability is situated in the way WordPress handles user display names in the Avatar block. The lack of proper output escaping makes it possible for attackers to embed arbitrary scripts into the display name field. This flaw specifically targets anyone with sufficient permissions to alter display names, facilitating malicious activity, such as data theft or session hijacking. As a result, both authenticated and unauthenticated attackers can exploit this vulnerability under the right circumstances, particularly affecting the user experience and security of websites using WordPress.
Impact of the Vulnerability
-
Data Theft: Attackers can execute scripts that may capture sensitive user information, including cookies and session identifiers, leading to potential account takeovers or data breaches.
-
Defacement and Misinformation: The ability to inject scripts allows attackers to alter the appearance and content of affected pages, which can mislead users, damage reputations, and disrupt services.
-
Wider Exploitation Potential: Since the vulnerability can be exploited by both authenticated and unauthenticated users, it poses a broader threat landscape, enabling attackers to target a wide array of WordPress sites without being authenticated, making it a pressing concern for website administrators.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
CVE-2024-4439 Description, Impact and Technical Details
CVE-2024-4439 is a vulnerability in WordPress Core that affects various versions up to 6.5.2. It allows authenticated attackers with contributor-levelβ¦
7 months ago
CVE-2024-4439 β WordPress WP Core Plugin Vulnerability - Rewterz
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name.
9 months ago
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- π
Vulnerability started trending
- πΎ
Exploit known to exist
- π°
First article discovered by Rewterz
Vulnerability published