CVE-2024-11273

6.1 MEDIUM

📋 TL;DR

This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into the Contact Form & SMTP Plugin settings, which then execute when other users view those settings. It affects WordPress multisite installations where unfiltered_html capability is restricted, and WordPress sites using PirateForms plugin versions before 2.6.0.

💻 Affected Systems

Products:
  • PirateForms WordPress Plugin
Versions: All versions before 2.6.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress multisite setup with unfiltered_html capability disallowed, or any WordPress installation where admin users have plugin configuration access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with admin privileges could inject persistent XSS payloads that steal session cookies, redirect users to malicious sites, or perform actions on behalf of other users when they view plugin settings pages.

🟠

Likely Case

Malicious administrator or compromised admin account injects XSS payloads that affect other administrators or users with access to plugin settings, potentially leading to session hijacking or further privilege escalation.

🟢

If Mitigated

With proper access controls and regular admin account monitoring, impact is limited to settings pages only, affecting users who can access plugin configuration.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin-level access to WordPress dashboard. Attack involves injecting JavaScript into plugin settings fields that lack proper sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.0

Vendor Advisory: https://wpscan.com/vulnerability/d1049a83-1298-4c8c-aeac-0055110d38fb/

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Contact Form & SMTP Plugin for WordPress by PirateForms'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.6.0+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate pirate-forms

Restrict Admin Access

all

Temporarily limit administrator account access to only trusted users

🧯 If You Can't Patch

  • Remove admin privileges from untrusted users and implement strict access controls
  • Monitor plugin settings pages for unauthorized script injections and implement Content Security Policy headers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → PirateForms version number

Check Version:

wp plugin list --name=pirate-forms --field=version

Verify Fix Applied:

Verify plugin version is 2.6.0 or higher in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to wp_options table with pirate_forms prefix
  • Admin users accessing plugin settings pages with suspicious parameters

Network Indicators:

  • Unexpected JavaScript loading from plugin settings pages
  • External script calls from admin-ajax.php related to pirate-forms

SIEM Query:

source="wordpress" AND (event="plugin_settings_update" AND plugin="pirate-forms") AND (parameters CONTAINS "<script>" OR parameters CONTAINS "javascript:")

🔗 References

📤 Share & Export