Server-Side Request Forgery and Stored Cross-Site Scripting in Greenshift Plugin for WordPress
CVE-2024-6155

6.4MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
9 January 2025

Summary

The Greenshift plugin for WordPress presents a risk where certain authenticated users (Subscriber level or higher) can exploit a lack of capability checks in the greenshift_download_file_localy function. This vulnerability allows for Server-Side Request Forgery (SSRF) attacks, facilitating web requests to unauthorized external locations. Additionally, it exposes the application to potential attacks via malicious SVG file uploads that could inject Cross-Site Scripting (XSS) payloads into the server. The issue is critical for cloud-based servers as attackers may gain access to sensitive instance metadata. The incomplete security measure was partially remedied in version 8.9.9 and fully addressed in version 9.0.1.

Affected Version(s)

Greenshift – animation and page builder blocks * <= 9.0.0

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arkadiusz Hydzik
.