CVE-2023-37393

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators to inject malicious scripts into the Atarim WordPress plugin, which are then stored and executed when other users view affected pages. It affects WordPress sites using Atarim Visual Collaboration plugin version 3.9.3 and earlier.

💻 Affected Systems

Products:
  • Atarim Visual Website Collaboration, Feedback & Project Management – Atarim WordPress plugin
Versions: <= 3.9.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level authentication to exploit. All WordPress installations with vulnerable plugin versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin credentials could inject persistent scripts that steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious admin could embed scripts that execute in other users' browsers, potentially stealing their WordPress session cookies or performing unauthorized actions within the Atarim collaboration interface.

🟢

If Mitigated

With proper admin credential protection and content security policies, impact is limited to the specific Atarim interface functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials. The stored nature means injected scripts persist across sessions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Atarim plugin and click 'Update Now'. 4. Verify version is 3.9.4 or higher.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the Atarim plugin until patched

wp plugin deactivate atarim-visual-collaboration
wp plugin delete atarim-visual-collaboration

Implement Content Security Policy

all

Add CSP headers to restrict script execution

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Restrict admin access to trusted users only with strong authentication
  • Monitor admin user activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Atarim plugin version

Check Version:

wp plugin get atarim-visual-collaboration --field=version

Verify Fix Applied:

Verify plugin version is 3.9.4 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user activity
  • Multiple plugin update attempts
  • Suspicious POST requests to Atarim endpoints

Network Indicators:

  • Unexpected script tags in Atarim-related HTTP responses
  • External script loads from Atarim pages

SIEM Query:

source="wordpress.log" AND "atarim" AND ("update" OR "admin_login")

🔗 References

📤 Share & Export