CVE-2024-5429

7.6 HIGH

📋 TL;DR

The Logo Slider WordPress plugin before version 4.1.0 contains a stored cross-site scripting (XSS) vulnerability. Users with contributor role or higher can inject malicious scripts into slider settings, which execute when administrators view those settings. This affects all WordPress sites running vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • Logo Slider WordPress Plugin
Versions: All versions before 4.1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least contributor-level access to exploit. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with contributor access could inject malicious scripts that steal administrator session cookies, redirect users to malicious sites, or perform actions as administrators when they view the affected settings.

🟠

Likely Case

Malicious contributors inject tracking scripts, defacement content, or credential-stealing payloads that execute when administrators manage slider settings.

🟢

If Mitigated

With proper role-based access controls and input validation, the impact is limited to potential data exposure from trusted but compromised contributor accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.0

Vendor Advisory: https://wpscan.com/vulnerability/ddb76c88-aeca-42df-830e-abffd29f1141/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Logo Slider' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.1.0+ from WordPress repository and replace the plugin files.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily restrict contributor role access or remove contributor users until patch is applied.

Disable Plugin

linux

Deactivate the Logo Slider plugin until it can be updated to a secure version.

wp plugin deactivate logo-slider

🧯 If You Can't Patch

  • Implement strict input validation and output escaping for all user-controlled data in slider settings
  • Apply Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Logo Slider version. If version is below 4.1.0, the site is vulnerable.

Check Version:

wp plugin get logo-slider --field=version

Verify Fix Applied:

Confirm Logo Slider plugin version is 4.1.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/admin-ajax.php with slider parameter modifications
  • Multiple failed XSS payload attempts in WordPress logs

Network Indicators:

  • Unexpected JavaScript execution in admin panel requests
  • External script loads from slider configuration pages

SIEM Query:

source="wordpress.log" AND ("logo-slider" OR "slider_settings") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export