CVE-2024-3886
📋 TL;DR
The tagDiv Composer WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to inject malicious scripts via the 'envato_code[]' parameter. This affects all WordPress sites using tagDiv Composer plugin versions up to and including 5.0. Attackers can exploit this by tricking users into clicking specially crafted links.
💻 Affected Systems
- tagDiv Composer WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as authenticated users, redirect to malicious sites, or install backdoors on the WordPress site.
Likely Case
Attackers will typically use this to steal session cookies or credentials from users who click malicious links, potentially leading to account compromise.
If Mitigated
With proper web application firewalls and user education about suspicious links, impact is limited to unsuccessful phishing attempts.
🎯 Exploit Status
Exploitation requires user interaction (clicking a link) but is trivial to weaponize in phishing campaigns.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 5.0
Vendor Advisory: https://tagdiv.com/newspaper/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'tagDiv Composer' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin until patch is released.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock requests containing malicious script patterns in the envato_code[] parameter
WAF-specific configuration required
Disable Plugin
linuxTemporarily disable the tagDiv Composer plugin until patched
wp plugin deactivate tagdiv-composer
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to prevent script execution
- Use web application firewall to block reflected XSS patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for tagDiv Composer version 5.0 or earlier
Check Version:
wp plugin get tagdiv-composer --field=version
Verify Fix Applied:
Verify plugin version is higher than 5.0 in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'envato_code[]' parameter with script tags or JavaScript code
- Unusual referrer headers with encoded script payloads
Network Indicators:
- GET requests with encoded script payloads in query parameters
- Traffic patterns showing users being redirected after clicking suspicious links
SIEM Query:
source="web_server_logs" AND uri_query="*envato_code*" AND (uri_query="*<script*" OR uri_query="*javascript:*")