CVE-2024-12308
📋 TL;DR
The Logo Slider WordPress plugin before version 4.6.0 has a stored cross-site scripting (XSS) vulnerability. It allows users with contributor roles or higher to inject malicious scripts into pages/posts via shortcode attributes, which execute when other users view the content. This affects WordPress sites using vulnerable versions of the plugin.
💻 Affected Systems
- Logo Slider WordPress plugin
📦 What is this software?
Logo Slider by Logichunt
⚠️ Risk & Real-World Impact
Worst Case
An attacker with contributor access could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users, potentially compromising admin accounts and the entire site.
Likely Case
A malicious contributor injects scripts to deface pages, display ads, or steal session data from users viewing affected posts/pages.
If Mitigated
With proper role-based access controls and input validation, the risk is limited to low-privilege script injection that may be blocked by browser security features.
🎯 Exploit Status
Exploitation requires contributor-level access. The vulnerability is in shortcode attribute handling, making it easy to weaponize once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.6.0
Vendor Advisory: https://wpscan.com/vulnerability/fa82ada7-357b-4f01-a0d6-ff633b188a80/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Logo Slider plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.6.0+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Remove Contributor Access
linuxTemporarily restrict contributor role access or disable the plugin until patched.
wp user list --role=contributor --field=ID | xargs wp user set-role subscriber
Disable Plugin
linuxDeactivate the Logo Slider plugin to prevent exploitation.
wp plugin deactivate logo-slider
🧯 If You Can't Patch
- Implement strict content security policy (CSP) headers to mitigate XSS impact
- Regularly audit user accounts and remove unnecessary contributor privileges
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins. If Logo Slider version is below 4.6.0, the site is vulnerable.
Check Version:
wp plugin get logo-slider --field=version
Verify Fix Applied:
Confirm Logo Slider plugin version is 4.6.0 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual shortcode modifications in post/page edits by contributor users
- Multiple failed login attempts followed by successful contributor login
Network Indicators:
- Unexpected script tags in HTTP responses containing 'logo-slider' shortcode attributes
SIEM Query:
source="wordpress.log" AND "shortcode" AND "logo-slider" AND ("update" OR "edit")