CVE-2024-4289

6.1 MEDIUM

📋 TL;DR

This vulnerability is a reflected cross-site scripting (XSS) flaw in the Sailthru Triggermail WordPress plugin. It allows attackers to inject malicious scripts via unsanitized parameters, which execute when viewed by administrators or other high-privilege users. WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Sailthru Triggermail WordPress plugin
Versions: Through version 1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Sailthru Triggermail plugin enabled; the vulnerability is in the plugin's code, not WordPress core.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform actions as the administrator (like installing backdoors, modifying content, or creating new admin accounts), or redirect users to malicious sites.

🟠

Likely Case

Attackers could steal session cookies or credentials from administrators who click on crafted malicious links, potentially leading to site compromise.

🟢

If Mitigated

With proper input validation and output escaping, the risk is eliminated; with web application firewalls (WAFs) or security plugins, malicious payloads might be blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking a high-privilege user into clicking a malicious link; no authentication is needed to trigger the vulnerability, but admin interaction is required for impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check plugin updates for version >1.1

Vendor Advisory: https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Sailthru Triggermail and click 'Update Now' if available. 4. If no update is available, consider disabling or removing the plugin.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the Sailthru Triggermail plugin to eliminate the vulnerability until a patch is applied.

wp plugin deactivate sailthru-triggermail

Implement WAF rules

all

Configure a web application firewall (WAF) to block XSS payloads in request parameters.

🧯 If You Can't Patch

  • Disable the Sailthru Triggermail plugin immediately to remove the attack surface.
  • Educate administrators to avoid clicking on untrusted links and use browser security extensions.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if Sailthru Triggermail is version 1.1 or earlier, it is vulnerable.

Check Version:

wp plugin get sailthru-triggermail --field=version

Verify Fix Applied:

After updating, confirm the plugin version is greater than 1.1 in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET or POST requests with script tags or JavaScript payloads in parameters to WordPress pages associated with the plugin.

Network Indicators:

  • HTTP requests containing malicious scripts in query strings or form data targeting the plugin's endpoints.

SIEM Query:

source="web_logs" AND (url="*sailthru*" OR url="*triggermail*") AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export