CVE-2024-35693
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into web pages generated by the 12 Step Meeting List WordPress plugin, which could execute in users' browsers. It affects all WordPress sites using this plugin from any version up to 3.14.33. Attackers could steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- WordPress 12 Step Meeting List plugin
📦 What is this software?
12 Step Meeting List by Code4recovery
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator credentials, take over the WordPress site, install backdoors, and compromise all user data.
Likely Case
Attackers steal user session cookies, perform unauthorized actions as logged-in users, or redirect users to malicious sites.
If Mitigated
With proper input validation and output encoding, the attack fails and no malicious scripts execute.
🎯 Exploit Status
Reflected XSS typically requires user interaction but is easy to exploit via crafted links.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.14.34 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find '12 Step Meeting List' and click 'Update Now'. 4. Verify version is 3.14.34 or higher.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the 12 Step Meeting List plugin until patched.
wp plugin deactivate 12-step-meeting-list
Implement WAF rules
allConfigure web application firewall to block XSS payloads targeting the plugin.
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use browser security extensions that block XSS attacks
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > 12 Step Meeting List version. If version is 3.14.33 or lower, you are vulnerable.
Check Version:
wp plugin get 12-step-meeting-list --field=version
Verify Fix Applied:
After updating, verify plugin version shows 3.14.34 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests with script tags or JavaScript payloads
- Multiple failed login attempts after suspicious links
Network Indicators:
- HTTP requests containing <script> tags or JavaScript in query parameters
- Traffic to known malicious domains after plugin access
SIEM Query:
source="web_server" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=") AND uri_path="/wp-content/plugins/12-step-meeting-list/"
🔗 References
- https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-33-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-33-cross-site-scripting-xss-vulnerability?_s_id=cve