CVE-2024-10186

6.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Event post WordPress plugin allows authenticated attackers with contributor-level access or higher to inject malicious scripts into website pages. When users visit compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites using Event post plugin versions up to 5.9.6 are affected.

💻 Affected Systems

Products:
  • WordPress Event post plugin
Versions: All versions up to and including 5.9.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Event post plugin enabled. Contributor-level authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers with contributor access inject malicious scripts that steal user session cookies or credentials when visitors view compromised event pages.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to isolated script execution without access to sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. Technical details and proof-of-concept are publicly available in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3182549/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Event post' plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 5.9.7+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable shortcode

all

Remove or disable the events_cal shortcode functionality to prevent exploitation

Add to theme's functions.php: remove_shortcode('events_cal');

Restrict user roles

all

Temporarily remove contributor-level posting capabilities until patch is applied

Use WordPress role editor plugin to modify contributor capabilities

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Apply web application firewall rules to detect and block XSS payloads in POST requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Event post. If version is 5.9.6 or lower, you are vulnerable.

Check Version:

wp plugin get event-post --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify plugin version shows 5.9.7 or higher in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin with script tags in parameters
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress server
  • Unusual JavaScript payloads in HTTP POST data

SIEM Query:

source="wordpress.log" AND ("events_cal" OR "script" OR "onerror" OR "javascript:")

🔗 References

📤 Share & Export