CVE-2024-12566
📋 TL;DR
This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into form settings in the Email Subscribers by Icegram Express plugin. When exploited, it enables stored cross-site scripting attacks that can target other users, even in WordPress multisite setups where unfiltered_html capabilities are restricted. Only WordPress sites using vulnerable versions of this specific plugin are affected.
💻 Affected Systems
- Email Subscribers by Icegram Express WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker with admin privileges could inject persistent malicious scripts that execute in victims' browsers, potentially stealing session cookies, performing actions as other users, or redirecting to malicious sites.
Likely Case
Malicious administrator or compromised admin account injects tracking scripts or defaces parts of the site visible to other users through plugin forms.
If Mitigated
With proper user access controls and regular admin account monitoring, impact is limited to potential defacement of plugin-specific form pages.
🎯 Exploit Status
Exploitation requires authenticated admin access. Attack would involve injecting script payloads into plugin form settings fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.7.45
Vendor Advisory: https://wpscan.com/vulnerability/9206064a-d54e-44ad-9670-65520ee166a6/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Email Subscribers by Icegram Express'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 5.7.45+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate email-subscribers
Restrict Admin Access
allTemporarily limit admin account access to trusted users only
🧯 If You Can't Patch
- Remove admin privileges from untrusted users and implement strict access controls
- Implement Content Security Policy headers to mitigate XSS impact
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin → Plugins → Installed Plugins. Look for Email Subscribers by Icegram Express version number.
Check Version:
wp plugin get email-subscribers --field=version
Verify Fix Applied:
Confirm plugin version is 5.7.45 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual modifications to plugin settings by admin users
- Suspicious script tags in plugin form configuration
Network Indicators:
- Unexpected JavaScript loading from plugin form pages
SIEM Query:
source="wordpress" AND (event="plugin_edit" OR event="option_update") AND plugin="email-subscribers" AND user_role="administrator"