CVE-2024-13422

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'url' parameter in the SEO Blogger to WordPress Migration plugin. When users click specially crafted links, arbitrary JavaScript executes in their browser context. All WordPress sites using this plugin up to version 0.4.8 are affected.

💻 Affected Systems

Products:
  • SEO Blogger to WordPress Migration using 301 Redirection plugin for WordPress
Versions: All versions up to and including 0.4.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default plugin configuration. Requires plugin to be installed and active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or deliver malware payloads.

🟠

Likely Case

Attackers create phishing links that appear legitimate but execute malicious scripts when clicked, potentially stealing session tokens or redirecting to credential harvesting pages.

🟢

If Mitigated

With proper Content Security Policy (CSP) headers and modern browser XSS protections, script execution may be blocked, limiting impact to failed injection attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS requires user interaction (clicking malicious link). Exploit code is publicly available in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.4.9 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3158474/seo-blogger-to-wordpress-301-redirector/trunk/seo-blogger-to-wordpress.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SEO Blogger to WordPress Migration using 301 Redirection'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 0.4.9+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate seo-blogger-to-wordpress-301-redirector

Web Application Firewall (WAF) rule

all

Block requests containing malicious script patterns in URL parameters

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to block inline script execution
  • Use browser security headers like X-XSS-Protection and X-Content-Type-Options

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'SEO Blogger to WordPress Migration using 301 Redirection' version 0.4.8 or lower

Check Version:

wp plugin get seo-blogger-to-wordpress-301-redirector --field=version

Verify Fix Applied:

Verify plugin version is 0.4.9 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with JavaScript payloads in 'url' parameter
  • Multiple 400/404 errors with suspicious query strings

Network Indicators:

  • Outbound connections to suspicious domains after clicking plugin links
  • Unusual redirect patterns

SIEM Query:

web.url:*<script* AND web.url:*url=* AND web.url:*seo-blogger*

🔗 References

📤 Share & Export