CVE-2023-45005

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts via specially crafted URLs in the Seriously Simple Stats WordPress plugin. When victims click these links, the scripts execute in their browser context, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using Seriously Simple Stats plugin version 1.5.1 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Seriously Simple Stats plugin
Versions: <= 1.5.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, install backdoors, or redirect visitors to malware distribution sites.

🟠

Likely Case

Attackers steal user session cookies, perform actions as logged-in users, or redirect users to phishing pages.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly weaponized in phishing campaigns and require minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Seriously Simple Stats. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.5.2+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the Seriously Simple Stats plugin until patched.

wp plugin deactivate seriously-simple-stats

Web Application Firewall rule

all

Add WAF rule to block XSS payloads targeting Seriously Simple Stats endpoints.

ModSecurity: SecRule REQUEST_URI "@rx /wp-content/plugins/seriously-simple-stats/" "phase:1,id:1001,block,msg:'XSS attempt on Seriously Simple Stats'"

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Seriously Simple Stats for version number. If version is 1.5.1 or lower, you are vulnerable.

Check Version:

wp plugin get seriously-simple-stats --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.5.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags or JavaScript in Seriously Simple Stats plugin URLs
  • Unusual GET parameters with encoded script payloads

Network Indicators:

  • HTTP requests to /wp-content/plugins/seriously-simple-stats/ with suspicious parameters

SIEM Query:

source="web_logs" AND uri="*seriously-simple-stats*" AND (query="*<script*" OR query="*javascript:*" OR query="*onload=*" OR query="*onerror=*")

🔗 References

📤 Share & Export