CVE-2024-13542

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with contributor-level access or higher to inject malicious scripts into WordPress pages using the WP Google Street View plugin's shortcode. The scripts execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • WP Google Street View (with 360° virtual tour) & Google maps + Local SEO plugin for WordPress
Versions: All versions up to and including 1.1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Contributor-level or higher user access is needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, install backdoors, redirect users to malicious sites, or completely compromise the WordPress site and potentially the server.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies, redirect visitors to phishing pages, or display unwanted advertisements.

🟢

If Mitigated

With proper user role management and input validation, impact is limited to defacement or minor content manipulation by trusted users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once an attacker has contributor privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227140%40wp-google-street-view&new=3227140%40wp-google-street-view&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Google Street View' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.1.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove Contributor XSS Capability

all

Temporarily remove contributor ability to publish posts/pages until patch applied

Use WordPress role editor plugin or add custom code to functions.php: remove_cap('contributor', 'publish_posts');

Disable Plugin

linux

Deactivate the vulnerable plugin until patched

wp plugin deactivate wp-google-street-view

🧯 If You Can't Patch

  • Implement strict user role management - limit contributor accounts to trusted users only
  • Add web application firewall (WAF) rules to block XSS payloads in shortcode attributes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → WP Google Street View version. If version ≤1.1.3, vulnerable.

Check Version:

wp plugin list --name='wp-google-street-view' --field=version

Verify Fix Applied:

Confirm plugin version is 1.1.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual post/page edits by contributor users
  • wpgsv shortcode with suspicious attribute values in post content

Network Indicators:

  • Outbound connections to unknown domains from WordPress pages
  • JavaScript loading from unexpected sources

SIEM Query:

source="wordpress.log" AND ("wpgsv" OR "shortcode") AND ("script" OR "javascript" OR "onclick" OR "onload")

🔗 References

📤 Share & Export