CVE-2024-11141

6.1 MEDIUM

📋 TL;DR

The Sailthru Triggermail WordPress plugin through version 1.1 contains stored cross-site scripting (XSS) vulnerabilities due to insufficient input sanitization and missing CSRF protection. This allows authenticated subscribers to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is disabled. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Sailthru Triggermail WordPress Plugin
Versions: All versions through 1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable even in WordPress multisite setups where unfiltered_html capability is disallowed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Subscribers inject malicious JavaScript that steals user session cookies or redirects users to phishing pages when they visit affected plugin pages.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution, preventing the XSS attack.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires subscriber-level authentication. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.1 (check plugin repository for latest)

Vendor Advisory: https://wpscan.com/vulnerability/6fe3544b-fb86-43e4-9771-6e9343f9f835/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Sailthru Triggermail plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched version is available

wp plugin deactivate sailthru-triggermail

Remove Subscriber XSS Capability

all

Temporarily restrict subscriber capabilities to prevent exploitation

wp user remove-role <username> subscriber
wp user add-role <username> contributor

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads in plugin parameters
  • Monitor and audit subscriber account activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Sailthru Triggermail version 1.1 or earlier

Check Version:

wp plugin get sailthru-triggermail --field=version

Verify Fix Applied:

Verify plugin version is updated beyond 1.1 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin pages
  • JavaScript payloads in plugin parameter values
  • Multiple failed login attempts followed by successful subscriber login

Network Indicators:

  • HTTP requests containing script tags or JavaScript in plugin-related parameters
  • Outbound connections to suspicious domains following plugin page visits

SIEM Query:

source="wordpress.log" AND ("sailthru" OR "triggermail") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export