CVE-2024-52424

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the WordPress wp-login customizer plugin allows attackers to inject malicious scripts that execute when administrators view the login page. This affects all WordPress sites using the wp-login customizer plugin version 1.0 or earlier. The vulnerability combines CSRF with stored XSS, enabling persistent attacks against administrative users.

💻 Affected Systems

Products:
  • WordPress wp-login customizer plugin
Versions: 1.0 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin activated. The plugin must be installed and active for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack administrator sessions, install backdoors, deface websites, steal sensitive data, or gain complete control of the WordPress installation.

🟠

Likely Case

Attackers inject malicious JavaScript that executes when administrators view the login page, potentially stealing session cookies or performing unauthorized actions.

🟢

If Mitigated

With proper CSRF protections and content security policies, the attack would fail or have limited impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an administrator into clicking a malicious link while authenticated. The stored XSS component makes attacks persistent.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/wp-login-customizer/wordpress-wp-login-customizer-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'wp-login customizer'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the wp-login customizer plugin until patched

wp plugin deactivate wp-login-customizer

Implement CSRF tokens

all

Add CSRF protection to WordPress admin forms

🧯 If You Can't Patch

  • Disable the wp-login customizer plugin immediately
  • Implement web application firewall rules to block XSS payloads and suspicious requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for wp-login customizer version 1.0 or earlier

Check Version:

wp plugin get wp-login-customizer --field=version

Verify Fix Applied:

Verify plugin version is 1.0.1 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php
  • JavaScript injection attempts in login page modifications

Network Indicators:

  • CSRF attacks originating from external domains
  • Malicious script loading in login page responses

SIEM Query:

source="wordpress.log" AND ("wp-login-customizer" OR "admin-ajax.php") AND (POST OR "script" OR "onload")

🔗 References

📤 Share & Export