CVE-2024-58305

8.8 HIGH

📋 TL;DR

WonderCMS 4.3.2 contains a cross-site scripting vulnerability in the module installation endpoint that allows attackers to inject malicious JavaScript. This can lead to remote code execution by tricking authenticated administrators into installing malicious modules via crafted links. All WonderCMS 4.3.2 installations with the vulnerable endpoint accessible are affected.

💻 Affected Systems

Products:
  • WonderCMS
Versions: 4.3.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator to be tricked into clicking malicious link. The module installation endpoint must be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through reverse shell installation leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Unauthorized module installation leading to backdoor persistence, data exfiltration, or website defacement.

🟢

If Mitigated

Limited impact with proper web application firewall rules and admin user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires social engineering to trick authenticated admin. Public exploit code available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.3 or later

Vendor Advisory: https://www.wondercms.com/

Restart Required: No

Instructions:

1. Backup your WonderCMS installation and database. 2. Download latest version from official website. 3. Replace all files except /files and /database directories. 4. Clear browser cache and test functionality.

🔧 Temporary Workarounds

Disable Module Installation

all

Temporarily disable module installation endpoint via .htaccess or web server configuration

# Apache .htaccess
RewriteRule ^installModule - [F,L]

Input Sanitization

all

Add custom input validation for module installation parameters

# In relevant PHP files, add:
$module = htmlspecialchars($_POST['module'], ENT_QUOTES, 'UTF-8');

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to prevent script execution
  • Restrict admin panel access to specific IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check if running WonderCMS version 4.3.2 by viewing admin panel or checking version.php file.

Check Version:

grep "define('VERSION'" /path/to/wondercms/version.php

Verify Fix Applied:

Verify version is 4.3.3 or later and test module installation with sanitized inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /installModule endpoint
  • Multiple failed module installation attempts
  • Suspicious user-agent strings in admin panel logs

Network Indicators:

  • Outbound connections to unknown IPs after admin login
  • Unusual traffic patterns from admin panel

SIEM Query:

source="web_logs" AND (uri="/installModule" OR user_agent="*script*" OR params="*javascript*")

🔗 References

📤 Share & Export