CVE-2024-37121

5.9 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by the Shortcode Addons WordPress plugin, which are then executed when other users view those pages. It affects all WordPress sites using Shortcode Addons versions up to 3.2.5, potentially compromising user sessions and site integrity.

💻 Affected Systems

Products:
  • Shortcode Addons WordPress Plugin
Versions: n/a through 3.2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies, perform actions on behalf of authenticated users, or display fraudulent content.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution while maintaining functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS typically requires some level of user interaction or content creation privileges, but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/shortcode-addons/wordpress-shortcode-addons-plugin-3-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Shortcode Addons' and check if update is available. 4. Click 'Update Now' or manually update to version 3.2.6+. 5. Verify plugin functionality after update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Shortcode Addons plugin until patched.

wp plugin deactivate shortcode-addons

Content Security Policy

all

Implement strict CSP headers to mitigate XSS impact.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Restrict user permissions to prevent untrusted users from creating/modifying content with shortcodes.
  • Implement web application firewall (WAF) rules to block XSS payload patterns in plugin requests.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Shortcode Addons version. If version is 3.2.5 or lower, you are vulnerable.

Check Version:

wp plugin get shortcode-addons --field=version

Verify Fix Applied:

After updating, verify plugin version shows 3.2.6 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin admin endpoints containing script tags or JavaScript code
  • Multiple failed login attempts followed by successful content creation/modification

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site
  • Unexpected iframe or script tags in HTTP responses

SIEM Query:

source="wordpress.log" AND ("shortcode-addons" OR "shortcode_addons") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export