CVE-2024-37487

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into web pages generated by the WP Directory Kit WordPress plugin. When users view these pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites using WP Directory Kit versions up to 1.3.5 are affected.

💻 Affected Systems

Products:
  • WP Directory Kit WordPress Plugin
Versions: All versions up to and including 1.3.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WP Directory Kit plugin enabled. Vulnerability is in the plugin's web page generation code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, take over WordPress sites, install backdoors, or redirect users to malicious sites.

🟠

Likely Case

Attackers steal user session cookies, perform actions as logged-in users, or deface website content.

🟢

If Mitigated

Script execution is blocked by browser security features or Content Security Policy headers, limiting impact to specific user sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited. Attackers need to trick users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wp-directory-kit-plugin-1-3-5-reflected-cross-site-scripting-xss-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP Directory Kit. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.3.6+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable WP Directory Kit plugin until patched

wp plugin deactivate wpdirectorykit

Implement Content Security Policy

all

Add CSP headers to block inline script execution

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Restrict plugin access to trusted users only using WordPress role management

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP Directory Kit version 1.3.5 or earlier

Check Version:

wp plugin get wpdirectorykit --field=version

Verify Fix Applied:

Verify WP Directory Kit version is 1.3.6 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags in parameters
  • Multiple failed XSS attempts in web server logs
  • Suspicious referrer URLs containing script payloads

Network Indicators:

  • HTTP requests with JavaScript in query parameters
  • Traffic patterns showing users clicking on malicious links

SIEM Query:

source="web_server_logs" AND ("<script>" OR "javascript:" OR "onload=" OR "onerror=") AND uri_path="*wpdirectorykit*"

🔗 References

📤 Share & Export