CVE-2024-4290

7.1 HIGH

📋 TL;DR

The Sailthru Triggermail WordPress plugin through version 1.1 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite installations where unfiltered_html is restricted. The vulnerability affects WordPress sites using this plugin.

💻 Affected Systems

Products:
  • Sailthru Triggermail WordPress Plugin
Versions: through 1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. Exploitation requires admin-level privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious admin or compromised admin account injects scripts that affect other users, potentially stealing credentials or performing unauthorized actions.

🟢

If Mitigated

With proper access controls and admin account security, the risk is limited to trusted administrators who would not exploit the vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access. The vulnerability is in plugin settings that lack proper input sanitization and output escaping.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2 or later

Vendor Advisory: https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/

Restart Required: No

Instructions:

1. Update the Sailthru Triggermail plugin to version 1.2 or later via WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find Sailthru Triggermail and click 'Update Now'. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Sailthru Triggermail plugin until patched

wp plugin deactivate sailthru-triggermail

Remove Plugin

all

Completely remove the vulnerable plugin

wp plugin delete sailthru-triggermail

🧯 If You Can't Patch

  • Restrict admin access to only trusted personnel and implement strong authentication
  • Implement web application firewall (WAF) rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin dashboard > Plugins > Installed Plugins for Sailthru Triggermail version 1.1 or earlier

Check Version:

wp plugin get sailthru-triggermail --field=version

Verify Fix Applied:

Verify plugin version is 1.2 or later in WordPress admin dashboard

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying plugin settings
  • JavaScript injection patterns in plugin configuration

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests to plugin endpoints

SIEM Query:

source="wordpress" AND (plugin="sailthru-triggermail" OR uri="/wp-admin/admin.php?page=sailthru-triggermail") AND (method="POST" OR method="PUT")

🔗 References

📤 Share & Export