CVE-2021-24693
📋 TL;DR
This stored cross-site scripting (XSS) vulnerability in the Simple Download Monitor WordPress plugin allows users with Contributor role or higher to inject malicious JavaScript via the 'File Thumbnail' field. The XSS executes even when downloads are in review state, potentially allowing attackers to compromise reviewer/admin accounts. WordPress sites using affected plugin versions are vulnerable.
💻 Affected Systems
- Simple Download Monitor WordPress Plugin
📦 What is this software?
Simple Download Monitor by Tipsandtricks Hq
⚠️ Risk & Real-World Impact
Worst Case
Attackers create rogue admin accounts, install malicious plugins, take full control of WordPress site, and potentially compromise the entire web server.
Likely Case
Attackers steal admin session cookies, modify site content, redirect visitors to malicious sites, or install backdoors.
If Mitigated
With proper user role management and input validation, impact limited to content modification within Contributor permissions.
🎯 Exploit Status
Exploitation requires Contributor-level access. Attack payload executes when admin/reviewer views affected download.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.9.5
Vendor Advisory: https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple Download Monitor. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.9.5+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Remove Contributor Access
allTemporarily remove Contributor role from all users or restrict plugin access
Disable Plugin
allDeactivate Simple Download Monitor plugin until patched
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to prevent XSS execution
- Use web application firewall (WAF) rules to block XSS payloads in post meta fields
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Simple Download Monitor version number
Check Version:
wp plugin list --name='simple-download-monitor' --field=version
Verify Fix Applied:
Confirm plugin version is 3.9.5 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual post meta updates by Contributor users
- JavaScript payloads in wp_postmeta table
Network Indicators:
- Suspicious JavaScript in HTTP responses for download pages
SIEM Query:
source="wordpress.log" AND "post_meta" AND ("File Thumbnail" OR "sdm_upload_thumbnail") AND javascript_patterns