CVE-2023-6961
📋 TL;DR
The WP Meta SEO WordPress plugin is vulnerable to stored cross-site scripting (XSS) via the Referer HTTP header. Unauthenticated attackers can inject malicious scripts that execute when users visit compromised pages, potentially affecting all WordPress sites using vulnerable plugin versions.
💻 Affected Systems
- WP Meta SEO WordPress Plugin
📦 What is this software?
Wp Meta Seo by Joomunited
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.
Likely Case
Session hijacking, credential theft, or website defacement affecting visitors and administrators.
If Mitigated
Limited impact with proper Content Security Policy (CSP) headers and input validation, though stored XSS remains dangerous.
🎯 Exploit Status
Stored XSS via HTTP headers is straightforward to exploit; no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.5.13 and later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Meta SEO and update to version 4.5.13 or later. 4. Verify update completes successfully.
🔧 Temporary Workarounds
Disable WP Meta SEO Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate wp-meta-seo
Implement Web Application Firewall (WAF)
allConfigure WAF rules to block malicious Referer headers containing script tags.
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate script execution
- Monitor and filter Referer headers at the web server or reverse proxy level
🔍 How to Verify
Check if Vulnerable:
Check WP Meta SEO plugin version in WordPress admin under Plugins > Installed Plugins.
Check Version:
wp plugin get wp-meta-seo --field=version
Verify Fix Applied:
Confirm plugin version is 4.5.13 or higher and test Referer header injection attempts are sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual Referer headers containing script tags or JavaScript code in web server logs
Network Indicators:
- HTTP requests with malicious Referer headers attempting XSS payloads
SIEM Query:
source="web_server_logs" AND (Referer="*<script>*" OR Referer="*javascript:*")
🔗 References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91e41d-b728-4eb0-86d5-043813d8c2c1?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91e41d-b728-4eb0-86d5-043813d8c2c1?source=cve