CVE-2024-50410

6.5 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in the Namaste! LMS WordPress plugin allows attackers to inject malicious scripts into web pages that are then executed when other users view those pages. All WordPress sites using Namaste! LMS versions up to 2.6.4 are affected. The vulnerability enables attackers to steal session cookies, redirect users, or perform actions on behalf of authenticated users.

💻 Affected Systems

Products:
  • Namaste! LMS WordPress Plugin
Versions: All versions up to and including 2.6.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Namaste! LMS plugin installed and activated. The vulnerability requires user interaction with the affected plugin components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, or redirect users to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers inject malicious JavaScript to steal user session cookies, potentially gaining unauthorized access to user accounts and performing actions on their behalf within the LMS.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before being stored or displayed, preventing execution in users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity. This is a stored XSS, meaning the payload persists and affects multiple users. Authentication level required for exploitation is not specified in available references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Namaste! LMS and click 'Update Now'. 4. Alternatively, download latest version from WordPress repository and manually update via FTP.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement custom input validation for all user inputs in the plugin

Add input sanitization functions like sanitize_text_field() before processing user data

Output Encoding

all

Apply proper output encoding when displaying user-controlled data

Use esc_html(), esc_attr(), or wp_kses() functions when outputting data

🧯 If You Can't Patch

  • Disable or remove the Namaste! LMS plugin until patched
  • Implement a Web Application Firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Namaste! LMS version

Check Version:

wp plugin list --name=namaste-lms --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 2.6.5 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints with script tags
  • Multiple failed login attempts following suspicious plugin activity

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site
  • Unexpected JavaScript execution in browser developer tools

SIEM Query:

source="wordpress" AND (plugin="namaste-lms" OR uri="/wp-content/plugins/namaste-lms/") AND (payload CONTAINS "<script>" OR payload CONTAINS "javascript:")

🔗 References

📤 Share & Export