CVE-2024-3814

5.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with author-level permissions or higher to inject malicious scripts into pages using the tagDiv Composer plugin. When other users view these compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites using tagDiv Composer versions up to 4.8 are affected.

💻 Affected Systems

Products:
  • tagDiv Composer WordPress Plugin
Versions: All versions up to and including 4.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with tagDiv Composer plugin enabled and at least one user with author-level permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface websites, or redirect visitors to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers with author access inject malicious scripts that steal user session cookies or credentials, leading to account takeover and potential privilege escalation.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement or minor data leakage from affected pages only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with author privileges or higher. The vulnerability is in the 'single' module where user input isn't properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9 or later

Vendor Advisory: https://tagdiv.com/tagdiv-composer-page-builder-basics/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find tagDiv Composer. 4. Click 'Update Now' if available. 5. If not, download latest version from WordPress repository or tagDiv website. 6. Upload and replace plugin files.

🔧 Temporary Workarounds

Restrict User Permissions

all

Temporarily reduce author-level user permissions or review author accounts for suspicious activity.

Implement Content Security Policy

linux

Add CSP headers to restrict script execution sources and mitigate XSS impact.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Add to nginx config: add_header Content-Security-Policy "default-src 'self'; script-src 'self'";

🧯 If You Can't Patch

  • Disable the tagDiv Composer plugin completely until patching is possible.
  • Implement strict user access controls and monitor author-level user activities closely.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for tagDiv Composer version. If version is 4.8 or lower, you are vulnerable.

Check Version:

wp plugin list --name=tagdiv-composer --field=version

Verify Fix Applied:

After updating, verify tagDiv Composer version shows 4.9 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content modifications by author-level users
  • Multiple page edits in short timeframes
  • Suspicious script tags in page content

Network Indicators:

  • Unexpected external script loads from WordPress pages
  • Suspicious outbound connections from user browsers

SIEM Query:

source="wordpress" AND (event="page_edit" AND user_role="author" AND content CONTAINS "<script>")

🔗 References

📤 Share & Export