CVE-2024-6072
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts via the REQUEST_URI parameter in the wp-cart-for-digital-products WordPress plugin. When victims using old web browsers visit specially crafted URLs, the scripts execute in their browsers. Only WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- wp-cart-for-digital-products WordPress plugin
📦 What is this software?
Wp Estore by Tipsandtricks Hq
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users in old browsers.
Likely Case
Limited impact affecting only users with outdated browsers; modern browsers typically neutralize this type of reflected XSS.
If Mitigated
No impact with proper Content Security Policy headers and modern browser security features.
🎯 Exploit Status
Exploitation requires crafting malicious URLs and convincing users to click them; only effective against old browsers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.5.5
Vendor Advisory: https://wpscan.com/vulnerability/1d8a344b-37e9-41e8-9de0-c67b7ca8e21b/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'wp-cart-for-digital-products'. 4. Click 'Update Now' if available. 5. Alternatively, download version 8.5.5+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched
Implement Content Security Policy
allAdd CSP headers to prevent script execution from untrusted sources
Header set Content-Security-Policy "default-src 'self'; script-src 'self'" in .htaccess or web server config
🧯 If You Can't Patch
- Implement web application firewall rules to block malicious REQUEST_URI patterns
- Educate users about not clicking suspicious links and keeping browsers updated
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for wp-cart-for-digital-products version
Check Version:
wp plugin list --name=wp-cart-for-digital-products --field=version (if WP-CLI installed)
Verify Fix Applied:
Confirm plugin version is 8.5.5 or higher in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual long URLs containing script tags in access logs
- Multiple 404 errors with suspicious parameters
Network Indicators:
- HTTP requests with script payloads in URL parameters
SIEM Query:
source="web_access_logs" AND uri="*<script>*"