CVE-2024-0904
📋 TL;DR
This vulnerability in the Fancy Product Designer WordPress plugin allows administrators to inject malicious scripts into plugin settings, which then execute when other users view those settings. It affects WordPress sites using vulnerable plugin versions, particularly in multisite configurations where unfiltered_html is restricted.
💻 Affected Systems
- Fancy Product Designer WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to site takeover, data theft, or malware distribution to visitors.
Likely Case
Privileged user executes stored XSS to steal session cookies, redirect users, or deface the site.
If Mitigated
Limited impact if only trusted administrators exist and proper input validation is enforced elsewhere.
🎯 Exploit Status
Exploitation requires admin privileges. No public exploit code identified at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.1.81
Vendor Advisory: https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Fancy Product Designer. 4. Click 'Update Now' if available, or manually update to version 6.1.81 or later.
🔧 Temporary Workarounds
Remove vulnerable plugin
allTemporarily deactivate and remove the plugin if not essential
wp plugin deactivate fancy-product-designer
wp plugin delete fancy-product-designer
Restrict admin access
allLimit administrator accounts to only trusted personnel
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
- Monitor administrator activities and plugin setting changes for suspicious behavior
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 6.1.81, you are vulnerable.
Check Version:
wp plugin get fancy-product-designer --field=version
Verify Fix Applied:
Confirm plugin version is 6.1.81 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin setting modifications by admin users
- JavaScript payloads in plugin option values
Network Indicators:
- Unexpected script loads from plugin-related pages
- Suspicious outbound connections from admin sessions
SIEM Query:
source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="fancy-product-designer"