CVE-2024-13850
📋 TL;DR
This stored XSS vulnerability in the Simple add pages or posts WordPress plugin allows authenticated administrators to inject malicious scripts into pages. When users view those pages, the scripts execute in their browsers. Only multi-site WordPress installations or those with unfiltered_html disabled are affected.
💻 Affected Systems
- Simple add pages or posts WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leads to site takeover, data theft, or malware distribution to all visitors.
Likely Case
Malicious administrator injects tracking scripts, defaces pages, or steals user session cookies.
If Mitigated
Limited impact due to requiring administrator access and specific WordPress configurations.
🎯 Exploit Status
Requires administrator-level access and specific WordPress configuration
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.1 or later
Vendor Advisory: https://wordpress.org/plugins/simple-add-pages-or-posts/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Simple add pages or posts'. 4. Click 'Update Now' if available, or delete and reinstall latest version.
🔧 Temporary Workarounds
Disable plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate simple-add-pages-or-posts
Enable unfiltered_html
allEnable unfiltered_html capability for administrators (not recommended for multi-user environments)
Add define('DISALLOW_UNFILTERED_HTML', false); to wp-config.php
🧯 If You Can't Patch
- Remove administrator access from untrusted users
- Implement web application firewall with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Simple add pages or posts. If version is 2.0.0 or lower, you are vulnerable.
Check Version:
wp plugin get simple-add-pages-or-posts --field=version
Verify Fix Applied:
Verify plugin version is 2.0.1 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual administrator activity creating/modifying pages with script tags
- Multiple page updates in short time
Network Indicators:
- Outbound connections to suspicious domains from WordPress pages
- Script tags in page content that shouldn't contain them
SIEM Query:
source="wordpress" AND (event="page_update" OR event="post_update") AND user_role="administrator" AND content CONTAINS "<script>"