CVE-2024-10076

5.9 MEDIUM

📋 TL;DR

This vulnerability in Jetpack and Jetpack Boost WordPress plugins allows contributor-level and higher users to inject malicious scripts through image URLs, which are then executed when other users view affected pages. It enables stored cross-site scripting (XSS) attacks that persist across sessions. WordPress sites using vulnerable versions of these plugins are affected.

💻 Affected Systems

Products:
  • Jetpack WordPress plugin
  • Jetpack Boost WordPress plugin
Versions: Jetpack < 13.8, Jetpack Boost < 3.4.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Site Accelerator feature enabled and user with contributor or higher privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with contributor access could inject persistent malicious scripts that steal admin credentials, deface websites, or install backdoors when administrators view compromised pages.

🟠

Likely Case

Malicious contributors or compromised accounts inject tracking scripts, redirect users to malicious sites, or perform limited content manipulation.

🟢

If Mitigated

With proper user access controls and content sanitization, impact is limited to content manipulation within contributor privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires contributor-level access. Exploitation involves manipulating image URLs to inject scripts through regex pattern matching flaws.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Jetpack 13.8+, Jetpack Boost 3.4.8+

Vendor Advisory: https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Jetpack and Jetpack Boost. 4. Click 'Update Now' if updates are available. 5. Alternatively, download latest versions from WordPress.org and upload via FTP.

🔧 Temporary Workarounds

Disable Site Accelerator

all

Temporarily disable the vulnerable feature until patching is possible

Restrict Contributor Privileges

all

Temporarily downgrade contributor users to subscriber role or implement additional content review

🧯 If You Can't Patch

  • Implement strict content sanitization for all user-generated content
  • Enable web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check plugin versions in WordPress admin: Plugins > Installed Plugins. Look for Jetpack version < 13.8 or Jetpack Boost version < 3.4.8.

Check Version:

wp plugin list --field=name,version | grep -E 'jetpack|jetpack-boost'

Verify Fix Applied:

Confirm Jetpack version is 13.8+ and Jetpack Boost version is 3.4.8+ in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual image URL patterns in content edits
  • Multiple failed login attempts followed by content modifications
  • Script tags in image src attributes

Network Indicators:

  • Unexpected script loads from image CDN URLs
  • Suspicious outbound connections after page views

SIEM Query:

source="wordpress" AND (event="plugin_update" OR event="content_edit") AND plugin_name IN ("jetpack", "jetpack-boost")

🔗 References

📤 Share & Export