CVE-2024-12308

5.4 MEDIUM

📋 TL;DR

The Logo Slider WordPress plugin before version 4.6.0 has a stored cross-site scripting (XSS) vulnerability. It allows users with contributor roles or higher to inject malicious scripts into pages/posts via shortcode attributes, which execute when other users view the content. This affects WordPress sites using vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • Logo Slider WordPress plugin
Versions: All versions before 4.6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Logo Slider plugin enabled and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users, potentially compromising admin accounts and the entire site.

🟠

Likely Case

A malicious contributor injects scripts to deface pages, display ads, or steal session data from users viewing affected posts/pages.

🟢

If Mitigated

With proper role-based access controls and input validation, the risk is limited to low-privilege script injection that may be blocked by browser security features.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access. The vulnerability is in shortcode attribute handling, making it easy to weaponize once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.0

Vendor Advisory: https://wpscan.com/vulnerability/fa82ada7-357b-4f01-a0d6-ff633b188a80/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Logo Slider plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.6.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove Contributor Access

linux

Temporarily restrict contributor role access or disable the plugin until patched.

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

Disable Plugin

linux

Deactivate the Logo Slider plugin to prevent exploitation.

wp plugin deactivate logo-slider

🧯 If You Can't Patch

  • Implement strict content security policy (CSP) headers to mitigate XSS impact
  • Regularly audit user accounts and remove unnecessary contributor privileges

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If Logo Slider version is below 4.6.0, the site is vulnerable.

Check Version:

wp plugin get logo-slider --field=version

Verify Fix Applied:

Confirm Logo Slider plugin version is 4.6.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode modifications in post/page edits by contributor users
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Unexpected script tags in HTTP responses containing 'logo-slider' shortcode attributes

SIEM Query:

source="wordpress.log" AND "shortcode" AND "logo-slider" AND ("update" OR "edit")

🔗 References

📤 Share & Export