CVE-2024-29763
📋 TL;DR
This reflected XSS vulnerability in the WordPress Meta Data and Taxonomies Filter plugin allows attackers to inject malicious scripts into web pages viewed by other users. It affects all WordPress sites using MDTF plugin versions up to 1.3.3. Attackers can steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- WordPress Meta Data and Taxonomies Filter (MDTF) plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator session cookies, gain full control of WordPress site, install backdoors, deface website, or steal sensitive user data.
Likely Case
Attackers steal user session cookies, redirect visitors to malicious sites, or perform limited actions within user permissions.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before execution.
🎯 Exploit Status
Reflected XSS typically requires user interaction (clicking malicious link) but is straightforward to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.4 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Meta Data and Taxonomies Filter'. 4. Click 'Update Now' if update available. 5. If no update, manually download version 1.3.4+ from WordPress repository.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the MDTF plugin until patched.
wp plugin deactivate wp-meta-data-filter-and-taxonomy-filter
Implement WAF rules
allAdd XSS protection rules to web application firewall.
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Enable WordPress security plugins with XSS protection features
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Meta Data and Taxonomies Filter' version ≤1.3.3.
Check Version:
wp plugin get wp-meta-data-filter-and-taxonomy-filter --field=version
Verify Fix Applied:
Verify plugin version is 1.3.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests with script tags or JavaScript in parameters
- Multiple failed XSS attempts in web server logs
Network Indicators:
- HTTP requests containing <script> tags or JavaScript in query parameters
- Unusual redirects from your WordPress site
SIEM Query:
source="web_server_logs" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=") AND uri="*mdtf*"
🔗 References
- https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve