CVE-2024-3635

4.8 MEDIUM

📋 TL;DR

The Post Grid WordPress plugin before version 7.5.0 contains a stored cross-site scripting (XSS) vulnerability in grid settings. This allows authenticated users with Editor privileges or higher to inject malicious scripts that execute when other users view affected pages. The vulnerability bypasses WordPress's unfiltered_html restriction, making it particularly dangerous in multisite configurations.

💻 Affected Systems

Products:
  • Post Grid WordPress Plugin
Versions: All versions before 7.5.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with Editor role or higher. Particularly impactful in WordPress multisite installations where unfiltered_html is typically restricted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with editor access could inject malicious JavaScript that steals administrator credentials, redirects users to phishing sites, or performs administrative actions on behalf of logged-in users, potentially leading to complete site compromise.

🟠

Likely Case

Malicious editors inject tracking scripts, deface content, or steal session cookies from other users viewing affected grid pages.

🟢

If Mitigated

With proper user access controls and content security policies, the impact is limited to potential content manipulation within the editor's authorized scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Editor privileges. The vulnerability is in grid settings that editors can modify.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.5.0

Vendor Advisory: https://wpscan.com/vulnerability/63cbe5f4-fe0f-499f-a964-cf4fbedcfa25/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Post Grid' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 7.5.0+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Restrict Editor Capabilities

all

Temporarily remove or restrict editor access to Post Grid settings using role management plugins.

Implement Content Security Policy

all

Add CSP headers to prevent execution of inline scripts and restrict script sources.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to wp-config.php: header("Content-Security-Policy: default-src 'self'; script-src 'self'");

🧯 If You Can't Patch

  • Immediately audit and monitor all users with Editor role or higher for suspicious activity.
  • Disable the Post Grid plugin entirely until patching is possible.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Post Grid version. If version is below 7.5.0, system is vulnerable.

Check Version:

wp plugin list --name=post-grid --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm Post Grid plugin version is 7.5.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to Post Grid settings by editor users
  • Multiple failed login attempts followed by successful editor login

Network Indicators:

  • Unexpected external script loads from Post Grid pages
  • Suspicious outbound connections from WordPress admin sessions

SIEM Query:

source="wordpress.log" AND ("post-grid" OR "grid settings") AND ("update" OR "modify" OR "save")

🔗 References

📤 Share & Export