CVE-2024-3519

6.1 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute reflected cross-site scripting attacks via the lang parameter in the Media Library Assistant WordPress plugin. Attackers can inject malicious scripts that execute when users click specially crafted links, potentially stealing session cookies or redirecting to malicious sites. All WordPress sites using Media Library Assistant plugin versions up to 3.15 are affected.

💻 Affected Systems

Products:
  • WordPress Media Library Assistant plugin
Versions: All versions up to and including 3.15
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain administrative access to WordPress, install backdoors, deface websites, or distribute malware to visitors.

🟠

Likely Case

Attackers steal user session cookies, perform actions as authenticated users, or redirect users to phishing/malware sites.

🟢

If Mitigated

With proper web application firewalls and security headers, script execution is blocked, limiting impact to failed attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking malicious links but requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.16 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3069819%40media-library-assistant%2Ftrunk&old=3060779%40media-library-assistant%2Ftrunk&sfp_email=&sfph_mail=#file3

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Media Library Assistant. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 3.16+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests containing malicious script patterns in lang parameter

WAF-specific configuration required

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"

🧯 If You Can't Patch

  • Disable Media Library Assistant plugin temporarily
  • Implement strict input validation at web server level for lang parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Media Library Assistant version number

Check Version:

wp plugin list --name=media-library-assistant --field=version

Verify Fix Applied:

Confirm plugin version is 3.16 or higher and test lang parameter with XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with lang parameter containing script tags or JavaScript code
  • Multiple failed XSS attempts from same IP

Network Indicators:

  • Unusual lang parameter values in GET requests
  • Requests to plugin endpoints with encoded script payloads

SIEM Query:

source="web_logs" AND uri="*mla_gallery*" AND query="*lang=*script*"

🔗 References

📤 Share & Export