CVE-2024-10788
📋 TL;DR
The Activity Log plugin for WordPress has a stored XSS vulnerability that allows unauthenticated attackers to inject malicious scripts into administrative pages. When administrators view affected pages, the scripts execute in their browser context. All WordPress sites using this plugin up to version 2.11.1 are affected.
💻 Affected Systems
- Activity Log – Monitor & Record User Changes WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as administrators (install backdoors, modify content), or redirect users to malicious sites.
Likely Case
Attackers inject tracking scripts, deface sites, or steal administrator credentials to gain persistent access.
If Mitigated
With proper input validation and output escaping, malicious scripts are neutralized before execution.
🎯 Exploit Status
XSS vulnerabilities are commonly exploited; unauthenticated access lowers the barrier.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.11.2 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/aryo-activity-log
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Activity Log' and click 'Update Now'. 4. Verify version is 2.11.2 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate aryo-activity-log
Content Security Policy
allImplement CSP headers to restrict script execution sources.
Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or use WordPress CSP plugin
🧯 If You Can't Patch
- Restrict administrative access to trusted IP addresses only.
- Monitor administrator activity logs for unusual behavior or script injections.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Activity Log' version 2.11.1 or lower.
Check Version:
wp plugin get aryo-activity-log --field=version
Verify Fix Applied:
Confirm plugin version is 2.11.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual entries in activity logs with script tags or JavaScript code
- Multiple failed login attempts followed by successful admin login
Network Indicators:
- Outbound connections to unknown domains from admin sessions
- Unexpected POST requests to plugin endpoints
SIEM Query:
source="wordpress" AND (plugin="aryo-activity-log" AND version<="2.11.1") OR (event_description CONTAINS "<script>" OR event_description CONTAINS "javascript:")
🔗 References
- https://plugins.trac.wordpress.org/browser/aryo-activity-log/tags/2.11.0/hooks/class-aal-hook-themes.php#L18
- https://plugins.trac.wordpress.org/browser/aryo-activity-log/tags/2.11.0/hooks/class-aal-hook-themes.php#L21
- https://www.wordfence.com/threat-intel/vulnerabilities/id/75324bf1-a00e-4da7-8d42-d224c39ceb79?source=cve