CVE-2024-12743

4.8 MEDIUM

📋 TL;DR

This vulnerability in the MailPoet WordPress plugin allows administrators to inject malicious scripts into plugin settings, which then execute when other users view those settings. It affects WordPress sites running MailPoet versions before 5.5.2, particularly in multisite configurations where unfiltered_html is restricted.

💻 Affected Systems

Products:
  • MailPoet WordPress Plugin
Versions: All versions before 5.5.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Particularly dangerous in WordPress multisite setups where unfiltered_html capability is disallowed by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject persistent XSS payloads that steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Malicious admin injects XSS that affects other administrators or privileged users viewing plugin settings, potentially leading to account compromise or privilege escalation.

🟢

If Mitigated

With proper user access controls and regular admin auditing, impact is limited to settings pages only affecting users with plugin access.

🌐 Internet-Facing: MEDIUM - WordPress sites are typically internet-facing, but exploitation requires admin privileges.
🏢 Internal Only: LOW - Internal-only WordPress instances still require admin access for exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin-level access to WordPress. No public exploit code has been observed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.2

Vendor Advisory: https://wpscan.com/vulnerability/7945f52d-364d-438c-84f2-cf19b4250056/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find MailPoet and click 'Update Now'. 4. Verify version shows 5.5.2 or higher.

🔧 Temporary Workarounds

Remove Admin Privileges

all

Temporarily restrict admin access to only essential personnel until patch is applied.

Disable MailPoet Plugin

linux

Temporarily deactivate the MailPoet plugin if not critically needed.

wp plugin deactivate mailpoet

🧯 If You Can't Patch

  • Implement strict user access controls and audit admin activities regularly
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check MailPoet plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get mailpoet --field=version

Verify Fix Applied:

Confirm MailPoet version is 5.5.2 or higher in plugin details

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying MailPoet settings
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Suspicious JavaScript in HTTP POST requests to /wp-admin/admin.php?page=mailpoet-*

SIEM Query:

source="wordpress.log" AND ("mailpoet" AND "admin.php") AND ("POST" OR "UPDATE")

🔗 References

📤 Share & Export