CVE-2024-1935

7.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress pages using the RafflePress plugin. When users visit compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites running vulnerable RafflePress plugin versions are affected.

💻 Affected Systems

Products:
  • RafflePress WordPress Plugin
Versions: All versions up to and including 1.12.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies, redirect visitors to phishing sites, or display unwanted advertisements.

🟢

If Mitigated

With proper web application firewalls and content security policies, script execution could be blocked, limiting impact to defacement or minor disruptions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward via HTTP requests to the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12.7

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?old_path=/rafflepress/tags/1.12.5&old=3043286&new_path=/rafflepress/tags/1.12.7&new=3043286

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find RafflePress and click 'Update Now'. 4. Verify version is 1.12.7 or higher.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block or sanitize requests containing malicious scripts in the parent_url parameter

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

🧯 If You Can't Patch

  • Disable the RafflePress plugin immediately
  • Implement strict input validation and output escaping at the application level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for RafflePress version 1.12.5 or lower

Check Version:

wp plugin list --name=rafflepress --field=version

Verify Fix Applied:

Confirm RafflePress version is 1.12.7 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags or JavaScript in parent_url parameter
  • Unusual POST requests to RafflePress endpoints

Network Indicators:

  • Inbound requests with encoded JavaScript in URL parameters
  • Outbound connections to suspicious domains after page loads

SIEM Query:

source="web_server" AND (uri="*parent_url=*<script>*" OR uri="*parent_url=*javascript:*")

🔗 References

📤 Share & Export