CVE-2024-5811

5.4 MEDIUM

📋 TL;DR

This vulnerability in the Simple Video Directory WordPress plugin allows contributors and higher-privileged users to inject malicious scripts into plugin settings. The stored XSS payload executes when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is normally restricted. This affects WordPress sites using vulnerable plugin versions.

💻 Affected Systems

Products:
  • Simple Video Directory WordPress Plugin
Versions: All versions before 1.4.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have at least contributor-level access. Multisite installations are particularly affected as unfiltered_html restrictions don't prevent this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with contributor access could inject persistent malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions as authenticated users when victims view compromised pages.

🟠

Likely Case

Malicious contributors or compromised accounts inject advertising scripts, deface content, or steal limited user data through stored XSS payloads.

🟢

If Mitigated

With proper user access controls and input validation, impact is limited to low-privileged user sessions and contained within plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor or higher privileges. Public proof-of-concept demonstrates the stored XSS injection technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.4

Vendor Advisory: https://wpscan.com/vulnerability/bf6c2e28-51ef-443b-b1c2-d555c7e12f7f/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple Video Directory plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.4.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate simple-video-directory

Restrict User Roles

all

Temporarily limit contributor and author role assignments

🧯 If You Can't Patch

  • Implement strict user access controls and audit contributor-level accounts
  • Add web application firewall rules to block XSS payload patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Simple Video Directory → Version number. If version is below 1.4.4, system is vulnerable.

Check Version:

wp plugin get simple-video-directory --field=version

Verify Fix Applied:

Confirm plugin version is 1.4.4 or higher in WordPress admin panel. Test plugin settings functionality for proper input sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin setting modifications by contributor users
  • JavaScript payloads in plugin option values

Network Indicators:

  • Unexpected script loads from plugin pages
  • Suspicious outbound connections from plugin content

SIEM Query:

source="wordpress" AND (event="plugin_updated" OR event="option_updated") AND plugin="simple-video-directory" AND version<"1.4.4"

🔗 References

📤 Share & Export