CVE-2024-11977

7.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the kk Star Ratings plugin. Attackers can potentially inject malicious code or access restricted functionality. All WordPress sites using kk Star Ratings plugin versions up to 5.4.10 are affected.

💻 Affected Systems

Products:
  • kk Star Ratings – Rate Post & Collect User Feedbacks WordPress plugin
Versions: All versions up to and including 5.4.10
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or malware installation via malicious shortcodes.

🟠

Likely Case

Unauthorized content injection, privilege escalation, or data exfiltration through WordPress shortcode functionality.

🟢

If Mitigated

Limited impact if shortcode execution is restricted by WordPress security plugins or hardened configurations.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows any internet user to attack vulnerable sites.
🏢 Internal Only: LOW - The vulnerability is accessible from any network location, not just internal networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires minimal technical skill as it involves simple HTTP requests to execute shortcodes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.11

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3158478/kk-star-ratings/tags/5.4.11/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'kk Star Ratings' and click 'Update Now'. 4. Verify version is 5.4.11 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the kk Star Ratings plugin until patched

wp plugin deactivate kk-star-ratings

Restrict AJAX endpoints

all

Block access to wp-admin/admin-ajax.php for unauthenticated users via web application firewall

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious shortcode execution attempts
  • Disable the kk Star Ratings plugin completely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → kk Star Ratings → Version number. If version is 5.4.10 or lower, you are vulnerable.

Check Version:

wp plugin get kk-star-ratings --field=version

Verify Fix Applied:

After updating, confirm plugin version is 5.4.11 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with 'action=kk_star_ratings' parameter
  • Shortcode execution errors in WordPress debug logs

Network Indicators:

  • HTTP requests containing shortcode syntax in POST parameters to admin-ajax.php

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "kk_star_ratings" AND ("shortcode" OR "[\" OR "]")

🔗 References

📤 Share & Export