CVE-2024-21752

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in Ajax Search Lite WordPress plugin allows attackers to trick authenticated users into executing malicious actions, which can lead to reflected XSS attacks. The vulnerability affects all versions up to 4.11.4. WordPress administrators and users with plugin access are at risk.

💻 Affected Systems

Products:
  • WordPress Ajax Search Lite plugin
Versions: All versions up to and including 4.11.4
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Ajax Search Lite plugin enabled. The vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, inject malicious scripts into WordPress sites, deface websites, or redirect users to malicious sites through successful CSRF+XSS chaining.

🟠

Likely Case

Attackers create malicious links that, when clicked by authenticated users, execute reflected XSS payloads in the victim's browser, potentially stealing session cookies or performing unauthorized actions.

🟢

If Mitigated

With proper CSRF tokens and input validation, the attack would fail as requests would be rejected without valid tokens and malicious inputs would be sanitized.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated users into clicking malicious links. The CSRF vulnerability enables reflected XSS, making exploitation straightforward once the user is authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.11.5 and later

Vendor Advisory: https://patchstack.com/database/vulnerability/ajax-search-lite/wordpress-ajax-search-lite-plugin-4-11-4-reflected-xss-via-cross-site-request-forgery-csrf-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Ajax Search Lite' and click 'Update Now'. 4. Verify update to version 4.11.5 or later.

🔧 Temporary Workarounds

Disable Ajax Search Lite plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ajax-search-lite

Implement CSRF protection middleware

all

Add custom CSRF token validation for WordPress admin actions

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attempts and XSS payloads
  • Restrict plugin access to trusted users only and monitor for suspicious admin activities

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Ajax Search Lite version. If version is 4.11.4 or lower, system is vulnerable.

Check Version:

wp plugin get ajax-search-lite --field=version

Verify Fix Applied:

After update, verify Ajax Search Lite version shows 4.11.5 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Ajax Search Lite endpoints without referrer headers
  • Multiple failed CSRF token validations in WordPress logs
  • Suspicious user-agent strings containing script tags

Network Indicators:

  • HTTP requests containing malicious script payloads in parameters
  • Requests to admin-ajax.php with unusual parameter patterns

SIEM Query:

source="wordpress.log" AND ("ajax-search-lite" OR "admin-ajax.php") AND ("<script>" OR "javascript:" OR "onerror=")

🔗 References

📤 Share & Export