CVE-2024-12733
📋 TL;DR
This vulnerability in the AffiliateImporterEb WordPress plugin allows attackers to inject malicious scripts via unsanitized parameters, which execute when viewed by administrators or other high-privilege users. It affects WordPress sites using the plugin up to version 1.0.6. The attack requires tricking authenticated users into clicking a specially crafted link.
💻 Affected Systems
- AffiliateImporterEb WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.
Likely Case
Session hijacking of admin accounts, defacement, or credential theft through phishing.
If Mitigated
Limited impact if only low-privilege users are targeted or if security headers like CSP are enforced.
🎯 Exploit Status
Exploitation requires user interaction (clicking a malicious link) and targets authenticated users, typically admins.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.7 or later
Vendor Advisory: https://wpscan.com/vulnerability/61be935e-ecb4-45be-8553-65877dd42569/
Restart Required: No
Instructions:
1. Update the AffiliateImporterEb plugin to version 1.0.7 or later via WordPress admin dashboard. 2. If auto-updates are enabled, verify the update applied. 3. Test plugin functionality post-update.
🔧 Temporary Workarounds
Disable or Remove Plugin
linuxTemporarily disable or uninstall the AffiliateImporterEb plugin if patching is not immediately possible.
wp plugin deactivate affiliate-importer-eb
wp plugin delete affiliate-importer-eb
Implement Content Security Policy (CSP)
allAdd a CSP header to block inline scripts and mitigate XSS impact.
Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or configure via web server settings.
🧯 If You Can't Patch
- Restrict plugin access to trusted users only via IP whitelisting or authentication hardening.
- Monitor for suspicious activity in WordPress logs and admin access patterns.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 1.0.6 or earlier, it is vulnerable.
Check Version:
wp plugin get affiliate-importer-eb --field=version
Verify Fix Applied:
Confirm the plugin version is 1.0.7 or later after update. Test by attempting to reproduce the XSS with a safe payload in a controlled environment.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET requests with script tags or JavaScript in query parameters to plugin pages.
- Multiple failed login attempts or admin session anomalies post-exploit.
Network Indicators:
- HTTP requests containing malicious script payloads in URLs targeting the plugin.
SIEM Query:
source="wordpress.log" AND (url="*affiliate-importer-eb*" AND (url="*<script>*" OR url="*javascript:*"))