CVE-2024-0383
📋 TL;DR
The WP Recipe Maker WordPress plugin has a stored XSS vulnerability in all versions up to 9.1.0. Authenticated attackers with contributor-level permissions or higher can inject malicious scripts via the 'group_tag' attribute in recipe shortcodes, which execute when users view affected pages. This affects all WordPress sites using the vulnerable plugin versions.
💻 Affected Systems
- WP Recipe Maker WordPress Plugin
📦 What is this software?
Wp Recipe Maker by Bootstrapped
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin credentials, redirect users to malicious sites, deface websites, or install backdoors for persistent access.
Likely Case
Attackers inject malicious scripts to steal user session cookies, redirect to phishing pages, or display unwanted content.
If Mitigated
With proper user role controls and input validation, impact is limited to content defacement or minor script injection.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple; weaponization likely due to widespread WordPress usage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.1.1
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Recipe Maker and click 'Update Now'. 4. Verify version is 9.1.1 or higher.
🔧 Temporary Workarounds
Restrict Contributor Permissions
allTemporarily remove contributor role permissions to edit posts/pages until patched.
Use WordPress role management plugin or custom code to restrict contributor capabilities
Disable Vulnerable Shortcodes
allRemove or disable the [wprm-recipe-instructions] and [wprm-recipe-ingredients] shortcodes.
Add to theme functions.php: remove_shortcode('wprm-recipe-instructions'); remove_shortcode('wprm-recipe-ingredients');
🧯 If You Can't Patch
- Implement strict input validation and output encoding for all user-supplied content in the plugin
- Monitor and audit all content changes by contributor-level users for suspicious scripts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for WP Recipe Maker version ≤9.1.0
Check Version:
wp plugin list --name='wp-recipe-maker' --field=version
Verify Fix Applied:
Confirm WP Recipe Maker version is ≥9.1.1 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual post/page edits by contributor users
- Script tags containing 'group_tag' attribute in content
Network Indicators:
- Unexpected external script loads from recipe pages
- Suspicious redirects from recipe content
SIEM Query:
source="wordpress" AND (event="post_modified" OR event="page_modified") AND user_role="contributor" AND content CONTAINS "group_tag"
🔗 References
- https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-ingredients.php
- https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-instructions.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/104b3c01-4623-43cb-aed4-16e3be62e1f9?source=cve
- https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-ingredients.php
- https://plugins.trac.wordpress.org/changeset/3019769/wp-recipe-maker/trunk/includes/public/shortcodes/recipe/class-wprm-sc-instructions.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/104b3c01-4623-43cb-aed4-16e3be62e1f9?source=cve