CVE-2023-3168
📋 TL;DR
The WP Reroute Email plugin for WordPress has a stored cross-site scripting (XSS) vulnerability in versions up to 1.4.9, allowing unauthenticated attackers to inject malicious scripts via email subjects. This affects WordPress sites using the vulnerable plugin, potentially compromising user sessions or defacing pages when users view injected content.
💻 Affected Systems
- WP Reroute Email plugin for WordPress
📦 What is this software?
Wp Reroute Email by Wp Reroute Email Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, redirect users to malicious sites, or perform actions as authenticated users, leading to full site compromise or data theft.
Likely Case
Attackers inject malicious scripts to deface pages, steal user data, or spread malware to visitors, causing reputational damage and potential legal issues.
If Mitigated
With proper input sanitization and output escaping, the risk is minimized to low, preventing script execution and limiting impact to minor disruptions.
🎯 Exploit Status
Exploitation is straightforward due to unauthenticated access and lack of input sanitization, making it attractive for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.5.0 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2933637/wp-reroute-email
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Reroute Email and update to version 1.5.0 or later. 4. Verify the update completes successfully.
🔧 Temporary Workarounds
Disable the plugin
allTemporarily deactivate the WP Reroute Email plugin to prevent exploitation until patching is possible.
wp plugin deactivate wp-reroute-email
🧯 If You Can't Patch
- Implement a web application firewall (WAF) to block XSS payloads in email subjects.
- Restrict access to the WordPress admin panel and monitor for unusual activity or script injections.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 1.4.9 or lower, it is vulnerable.
Check Version:
wp plugin get wp-reroute-email --field=version
Verify Fix Applied:
After updating, confirm the plugin version is 1.5.0 or higher in the same location and test email subject inputs for script execution.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to plugin endpoints with script tags in email subjects
- Error logs showing XSS attempts or script injections
Network Indicators:
- HTTP requests containing malicious script payloads in email subject parameters
SIEM Query:
source="wordpress_logs" AND ("wp-reroute-email" OR "email subject") AND ("script" OR "onerror" OR "javascript:")
🔗 References
- https://plugins.trac.wordpress.org/changeset/2933637/wp-reroute-email
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=cve
- https://plugins.trac.wordpress.org/changeset/2933637/wp-reroute-email
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=cve