CVE-2024-12588

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into website pages via the Staff widget. The scripts execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using the Phlox theme's Shortcodes and extra features plugin up to version 2.16.4 are affected.

💻 Affected Systems

Products:
  • Shortcodes and extra features for Phlox theme (auxin-elements)
Versions: All versions up to and including 2.16.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with contributor privileges or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, install backdoors, or completely compromise the WordPress site and potentially the hosting server.

🟠

Likely Case

Site defacement, cookie/session theft leading to account takeover, or injection of cryptocurrency miners/adware into visitor browsers.

🟢

If Mitigated

Limited to minor defacement or data leakage if proper content security policies and user privilege restrictions are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. The vulnerability is well-documented with public proof-of-concept available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.16.5 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/auxin-elements/trunk/includes/elements/staff.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Shortcodes and extra features for Phlox theme'. 4. Click 'Update Now' if available, or manually update to version 2.16.5+. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Disable Staff Widget

all

Remove or disable the vulnerable Staff widget from all pages/posts

Restrict User Roles

all

Temporarily remove contributor privileges from untrusted users

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Install web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Shortcodes and extra features for Phlox theme' version 2.16.4 or lower

Check Version:

wp plugin list --name='auxin-elements' --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm plugin version is 2.16.5 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with staff widget parameters
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Unusual outbound connections from WordPress site after page views
  • Suspicious JavaScript payloads in HTTP responses

SIEM Query:

source="wordpress.log" AND ("staff" OR "auxin") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export