CVE-2024-4339

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into pages using the Prime Slider plugin's General widget. The scripts are stored and execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using vulnerable versions of the Prime Slider plugin are affected.

💻 Affected Systems

Products:
  • Prime Slider – Addons For Elementor (WordPress plugin)
Versions: All versions up to and including 3.14.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Prime Slider plugin installed and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, install backdoors, or completely compromise the WordPress site and potentially the underlying server.

🟠

Likely Case

Site defacement, cookie/session theft leading to account takeover, or injection of cryptocurrency miners/adware into visitor browsers.

🟢

If Mitigated

With proper user role management limiting contributors and strong CSP headers, impact is reduced to potential defacement only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access but is technically simple once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.14.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3080132%40bdthemes-prime-slider-lite%2Ftrunk&old=3079066%40bdthemes-prime-slider-lite%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Prime Slider – Addons For Elementor'. 4. Click 'Update Now' if available, or manually update to version 3.14.4+. 5. Clear any caching plugins/CDN caches.

🔧 Temporary Workarounds

Disable Prime Slider Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate bdthemes-prime-slider-lite

Restrict User Roles

all

Remove contributor access or implement strict role-based access control.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Install a Web Application Firewall (WAF) with XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Prime Slider version. If version is 3.14.3 or lower, you are vulnerable.

Check Version:

wp plugin get bdthemes-prime-slider-lite --field=version

Verify Fix Applied:

Confirm Prime Slider plugin version is 3.14.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with Prime Slider parameters
  • Suspicious content in wp_posts table containing script tags

Network Indicators:

  • Unexpected JavaScript loading from your domain in browser developer tools

SIEM Query:

source="wordpress.log" AND "prime-slider" AND ("POST" OR "script" OR "alert")

🔗 References

📤 Share & Export