CVE-2024-3075

8.1 HIGH

📋 TL;DR

The MM-email2image WordPress plugin through version 0.2.5 contains a stored cross-site scripting (XSS) vulnerability due to improper input validation and escaping of shortcode attributes. This allows authenticated users with contributor-level permissions or higher to inject malicious scripts into pages/posts, which execute when other users view the content. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • MM-email2image WordPress Plugin
Versions: 0.2.5 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious scripts that steal administrator session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious contributors inject scripts that display unwanted content, redirect users, or steal session cookies from visitors viewing affected pages/posts.

🟢

If Mitigated

With proper user role management and content review processes, the impact is limited to potential defacement or minor disruption on affected pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.2.6 or later

Vendor Advisory: https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find MM-email2image plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate mm-email2image

Restrict User Roles

all

Temporarily remove contributor role from untrusted users

wp user remove-role <username> contributor

🧯 If You Can't Patch

  • Implement strict content review process for all posts/pages created by contributors
  • Add web application firewall rules to block XSS payloads in plugin shortcode attributes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for MM-email2image version 0.2.5 or earlier

Check Version:

wp plugin get mm-email2image --field=version

Verify Fix Applied:

Verify plugin version is 0.2.6 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual post/page edits by contributors containing script tags or encoded payloads
  • Multiple failed login attempts followed by successful contributor login

Network Indicators:

  • Outbound connections to suspicious domains from WordPress site visitors
  • Unusual JavaScript loading patterns in page responses

SIEM Query:

source="wordpress.log" AND ("mm-email2image" OR "shortcode") AND ("script" OR "onerror" OR "javascript:")

🔗 References

📤 Share & Export