CVE-2024-12716

4.8 MEDIUM

📋 TL;DR

This vulnerability in the Simple Basic Contact Form WordPress plugin allows administrators to inject malicious scripts into plugin settings, which are then executed when other users view those settings. It affects WordPress sites using vulnerable versions of this plugin, particularly in multisite configurations where unfiltered_html capability is restricted. The attack requires admin-level privileges but can target all users who view the affected pages.

💻 Affected Systems

Products:
  • Simple Basic Contact Form WordPress Plugin
Versions: All versions before 20250114
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. Particularly dangerous in WordPress multisite setups where unfiltered_html capability is disallowed by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could inject persistent malicious scripts that steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users across the entire WordPress site.

🟠

Likely Case

Malicious admin injects JavaScript that captures user sessions or displays unwanted content to other administrators and editors who manage the plugin settings.

🟢

If Mitigated

With proper user access controls and regular plugin updates, impact is limited to potential privilege escalation within the admin panel only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative privileges. The vulnerability is in plugin settings that aren't properly sanitized before being stored and displayed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20250114

Vendor Advisory: https://wpscan.com/vulnerability/a9fa48f1-d7fd-4968-a122-937803f186a2/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Simple Basic Contact Form'. 4. Click 'Update Now' if available. 5. If no update appears, download version 20250114+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate simple-basic-contact-form

Restrict Admin Access

all

Limit administrative accounts to trusted users only and implement multi-factor authentication

🧯 If You Can't Patch

  • Remove admin privileges from untrusted users and implement strict access controls
  • Install a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Simple Basic Contact Form → Version. If version is earlier than 20250114, you are vulnerable.

Check Version:

wp plugin get simple-basic-contact-form --field=version

Verify Fix Applied:

Verify plugin version is 20250114 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to plugin settings by admin users
  • JavaScript payloads in plugin option values in database

Network Indicators:

  • Unexpected outbound connections from WordPress admin pages to external domains

SIEM Query:

source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="simple-basic-contact-form"

🔗 References

📤 Share & Export