CVE-2024-5811
📋 TL;DR
This vulnerability in the Simple Video Directory WordPress plugin allows contributors and higher-privileged users to inject malicious scripts into plugin settings. The stored XSS payload executes when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is normally restricted. This affects WordPress sites using vulnerable plugin versions.
💻 Affected Systems
- Simple Video Directory WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers with contributor access could inject persistent malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users when victims view compromised pages.
Likely Case
Malicious contributors or compromised accounts inject advertising scripts, deface content, or steal limited user data through stored XSS payloads.
If Mitigated
With proper user access controls and input validation, impact is limited to low-privileged user sessions and contained within plugin functionality.
🎯 Exploit Status
Exploitation requires contributor or higher privileges. Public proof-of-concept demonstrates the stored XSS injection technique.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.4
Vendor Advisory: https://wpscan.com/vulnerability/bf6c2e28-51ef-443b-b1c2-d555c7e12f7f/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple Video Directory plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.4.4+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate simple-video-directory
Restrict User Roles
allTemporarily limit contributor and author role assignments
🧯 If You Can't Patch
- Implement strict user access controls and audit contributor-level accounts
- Add web application firewall rules to block XSS payload patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Simple Video Directory → Version number. If version is below 1.4.4, system is vulnerable.
Check Version:
wp plugin get simple-video-directory --field=version
Verify Fix Applied:
Confirm plugin version is 1.4.4 or higher in WordPress admin panel. Test plugin settings functionality for proper input sanitization.
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin setting modifications by contributor users
- JavaScript payloads in plugin option values
Network Indicators:
- Unexpected script loads from plugin pages
- Suspicious outbound connections from plugin content
SIEM Query:
source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="simple-video-directory" AND version<"1.4.4"