CVE-2024-13867
📋 TL;DR
This vulnerability allows unauthenticated attackers to inject malicious scripts via the 's' parameter in the Listivo WordPress theme. When users click specially crafted links, the scripts execute in their browsers, potentially stealing cookies or session tokens. All WordPress sites using Listivo theme versions up to 2.3.67 are affected.
💻 Affected Systems
- Listivo - Classified Ads WordPress Theme
📦 What is this software?
Listivo by Tangiblewp
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, or deface the website.
Likely Case
Attackers steal user session cookies, redirect users to malicious sites, or perform limited actions within the user's context.
If Mitigated
Script execution is blocked by browser security features or web application firewalls, limiting impact to minor UI disruption.
🎯 Exploit Status
Simple reflected XSS requiring user interaction (clicking malicious link). No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 2.3.68 or later
Vendor Advisory: https://themeforest.net/item/listivo-classified-ads-wordpress-theme/34032749
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Listivo theme updates. 4. Update to version 2.3.68 or later. 5. Clear any caching plugins/CDN caches.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block XSS payloads in URL parameters
Disable Theme Search
allRemove or disable the vulnerable search functionality if not needed
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use security plugins like Wordfence with XSS protection enabled
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Appearance > Themes for Listivo theme version. If version is 2.3.67 or lower, site is vulnerable.
Check Version:
wp theme list --field=name,version --path=/path/to/wordpress | grep -i listivo
Verify Fix Applied:
After updating, test search functionality with basic XSS payload like <script>alert('test')</script> in 's' parameter. No script should execute.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with script tags in 's' parameter
- Unusual search queries containing JavaScript code
Network Indicators:
- URLs containing script tags or encoded JavaScript in query parameters
SIEM Query:
source="web_access_logs" AND (uri_query="*<script*" OR uri_query="*javascript:*")