CVE-2024-0672

7.1 HIGH

📋 TL;DR

The Pz-LinkCard WordPress plugin through version 2.5.1 contains a reflected cross-site scripting (XSS) vulnerability. Attackers can inject malicious scripts via unsanitized parameters, which execute when viewed by administrators or other high-privilege users. This affects all WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • Pz-LinkCard WordPress Plugin
Versions: All versions up to and including 2.5.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated. The vulnerability is in parameter handling that outputs unsanitized data back to pages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform actions as the administrator (like installing backdoors, creating new admin accounts), or redirect users to malicious sites.

🟠

Likely Case

Attackers would typically steal session cookies to gain administrative access, then maintain persistence or deploy additional malware.

🟢

If Mitigated

With proper web application firewalls and input validation, the attack would be blocked before reaching vulnerable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking an authenticated user (preferably admin) to click a malicious link. The vulnerability is well-documented in public sources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.2 or later

Vendor Advisory: https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Pz-LinkCard and update to version 2.5.2 or later. 4. If update not available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Configure WAF to block XSS payloads in query parameters targeting the vulnerable endpoint.

Depends on specific WAF (e.g., ModSecurity, Cloudflare, AWS WAF)

Disable Plugin

linux

Temporarily deactivate the Pz-LinkCard plugin until patched.

wp plugin deactivate pz-linkcard

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.
  • Restrict admin panel access to trusted IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Pz-LinkCard version 2.5.1 or earlier.

Check Version:

wp plugin list --name=pz-linkcard --field=version

Verify Fix Applied:

Confirm plugin version is 2.5.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags or JavaScript in query parameters to plugin endpoints.
  • Multiple failed login attempts followed by successful admin login from new IP.

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript in URL parameters targeting /wp-content/plugins/pz-linkcard/

SIEM Query:

source="web_access_logs" AND (uri="/wp-content/plugins/pz-linkcard/" AND (query="*<script>*" OR query="*javascript:*"))

🔗 References

📤 Share & Export