CVE-2024-2872

4.8 MEDIUM

📋 TL;DR

The socialdriver-framework WordPress plugin before version 2024.04.30 has a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated users with contributor-level privileges or higher to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is normally restricted. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • socialdriver-framework WordPress plugin
Versions: All versions before 2024.04.30
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. Vulnerability is present in default configuration and affects both single-site and multisite WordPress installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious JavaScript that steals administrator session cookies, leading to full site compromise, data theft, or malware distribution to visitors.

🟠

Likely Case

Authenticated attackers inject malicious scripts that execute when administrators or other users view plugin settings pages, potentially leading to privilege escalation or session hijacking.

🟢

If Mitigated

With proper user access controls and regular security monitoring, impact is limited to potential data exposure from affected user sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level or higher WordPress user account. The vulnerability is in plugin settings that should be accessible to authenticated users with appropriate privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.04.30

Vendor Advisory: https://wpscan.com/vulnerability/15d3150c-673c-4c36-ac5e-85767d78b9eb/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'socialdriver-framework' plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2024.04.30+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available

wp plugin deactivate socialdriver-framework

Restrict User Capabilities

all

Temporarily remove contributor role or restrict access to plugin settings

Use WordPress role management plugins or custom code to modify capabilities

🧯 If You Can't Patch

  • Remove contributor role access or implement strict user access controls
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → socialdriver-framework version. If version is below 2024.04.30, you are vulnerable.

Check Version:

wp plugin get socialdriver-framework --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2024.04.30 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin settings modifications by contributor-level users
  • Multiple failed login attempts followed by plugin settings access

Network Indicators:

  • HTTP POST requests to wp-admin/admin.php?page=socialdriver-framework with script tags in parameters

SIEM Query:

source="wordpress.log" AND ("socialdriver-framework" AND "settings" AND ("<script>" OR "javascript:"))

🔗 References

📤 Share & Export