CVE-2024-13610

4.8 MEDIUM

📋 TL;DR

This vulnerability in the Simple Social Media Share Buttons WordPress plugin allows administrators to inject malicious scripts into plugin settings, which then execute when other users view pages containing those settings. It affects WordPress sites using plugin versions before 6.0.0, particularly in multisite configurations where unfiltered_html capability is restricted.

💻 Affected Systems

Products:
  • Simple Social Media Share Buttons WordPress Plugin
Versions: All versions before 6.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. Particularly relevant for WordPress multisite installations where unfiltered_html capability is disabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Malicious admin injects JavaScript that steals user session data or performs unauthorized actions when other users visit affected pages.

🟢

If Mitigated

Limited to admin users only, with minimal impact if proper user access controls and monitoring are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access to WordPress. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.0

Vendor Advisory: https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Simple Social Media Share Buttons'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 6.0.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the plugin until patched version can be installed.

wp plugin deactivate simple-social-media-share-buttons
wp plugin delete simple-social-media-share-buttons

Restrict admin access

all

Limit administrative accounts to trusted users only and implement strong authentication.

🧯 If You Can't Patch

  • Implement strict access controls for administrative accounts and monitor for suspicious activity.
  • Use web application firewall rules to block XSS payloads in plugin settings.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Simple Social Media Share Buttons → Version. If version is below 6.0.0, system is vulnerable.

Check Version:

wp plugin get simple-social-media-share-buttons --field=version

Verify Fix Applied:

Confirm plugin version is 6.0.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to plugin settings by admin users
  • JavaScript payloads in WordPress database wp_options table

Network Indicators:

  • Unexpected outbound connections from WordPress site after visiting pages with social share buttons

SIEM Query:

source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="simple-social-media-share-buttons"

🔗 References

📤 Share & Export