CVE-2024-10472

5.9 MEDIUM

📋 TL;DR

This vulnerability in the Stylish Price List WordPress plugin allows high-privilege users (like contributors) to inject malicious scripts into plugin settings. The stored XSS payload executes when other users view affected pages, even when unfiltered_html is disabled. WordPress multisite installations are particularly vulnerable.

💻 Affected Systems

Products:
  • WordPress Stylish Price List plugin
Versions: All versions before 7.1.12
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Multisite WordPress installations are especially vulnerable as unfiltered_html is often disabled by default in such configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with contributor access could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors through stored XSS payloads.

🟠

Likely Case

Malicious contributors or compromised accounts inject tracking scripts, adware, or credential harvesting forms that affect all site visitors.

🟢

If Mitigated

With proper user access controls and regular plugin updates, impact is limited to minor content manipulation by trusted users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.12

Vendor Advisory: https://wpscan.com/vulnerability/d79e5c05-26d0-4223-891f-42ac9fb6ef6e/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Stylish Price List' and click 'Update Now'. 4. Verify version shows 7.1.12 or higher.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patching is possible

wp plugin deactivate stylish-price-list

Restrict User Roles

all

Temporarily remove contributor access or limit plugin settings permissions

🧯 If You Can't Patch

  • Implement strict user access controls - limit contributor accounts to trusted users only
  • Enable WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is below 7.1.12, system is vulnerable.

Check Version:

wp plugin get stylish-price-list --field=version

Verify Fix Applied:

Confirm plugin version shows 7.1.12 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin setting modifications by contributor users
  • Multiple failed login attempts followed by plugin configuration changes

Network Indicators:

  • External script loads from unexpected domains on price list pages
  • Unusual outbound connections from WordPress admin sessions

SIEM Query:

source="wordpress" AND (event="plugin_edit" OR event="option_update") AND user_role="contributor" AND plugin="stylish-price-list"

🔗 References

📤 Share & Export