CVE-2024-4477
📋 TL;DR
CVE-2024-4477 is an unauthenticated stored cross-site scripting (XSS) vulnerability in the WP Logs Book WordPress plugin. Attackers can inject malicious scripts into log entries that execute when administrators view the plugin's dashboard. This affects all WordPress sites using vulnerable versions of the WP Logs Book plugin.
💻 Affected Systems
- WP Logs Book WordPress Plugin
📦 What is this software?
Wp Logs Book by Onetarek
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as administrators (like installing backdoors), or redirect users to malicious sites.
Likely Case
Attackers inject malicious JavaScript to steal administrator credentials or session tokens, potentially leading to site compromise.
If Mitigated
With proper input validation and output escaping, the malicious scripts would be rendered harmless as text rather than executable code.
🎯 Exploit Status
Exploitation requires no authentication and involves simple script injection into log data fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.2 or later
Vendor Advisory: https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Logs Book plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.0.2+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable WP Logs Book Plugin
allTemporarily deactivate the vulnerable plugin until patched.
wp plugin deactivate wp-logs-book
Restrict Admin Dashboard Access
allLimit access to WordPress admin dashboard to trusted IP addresses only.
🧯 If You Can't Patch
- Disable the WP Logs Book plugin immediately.
- Implement web application firewall (WAF) rules to block XSS payloads targeting the plugin endpoints.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for WP Logs Book version. If version is 1.0.1 or earlier, you are vulnerable.
Check Version:
wp plugin get wp-logs-book --field=version
Verify Fix Applied:
After updating, verify WP Logs Book plugin version is 1.0.2 or later in WordPress admin plugins page.
📡 Detection & Monitoring
Log Indicators:
- Unusual log entries containing script tags or JavaScript code in WP Logs Book logs
- Multiple failed login attempts followed by successful admin login from new IP
Network Indicators:
- HTTP POST requests to wp-logs-book endpoints containing script tags or JavaScript payloads
SIEM Query:
source="wordpress" AND (uri_path="*wp-logs-book*" AND (http_method="POST" AND (content="*<script>*" OR content="*javascript:*")))