CVE-2024-6074

6.1 MEDIUM

📋 TL;DR

This vulnerability in the wp-cart-for-digital-products WordPress plugin allows attackers to inject malicious scripts via unsanitized parameters, which are then reflected back to users. It primarily affects high-privilege users like administrators who could be tricked into clicking malicious links. The attack requires user interaction but can lead to session hijacking or administrative account compromise.

💻 Affected Systems

Products:
  • wp-cart-for-digital-products WordPress plugin
Versions: All versions before 8.5.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version. Attack requires user interaction with malicious link.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account takeover leading to full website compromise, data theft, or malware injection across the WordPress site.

🟠

Likely Case

Session hijacking of logged-in users, credential theft, or limited administrative actions if an admin is tricked.

🟢

If Mitigated

Minimal impact with proper input validation, output encoding, and user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via crafted URLs. No authentication required to trigger the vulnerability, though user interaction is needed for impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.5.5

Vendor Advisory: https://wpscan.com/vulnerability/e518af46-cb8e-43ff-a7c1-5300b36d9113/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'wp-cart-for-digital-products'. 4. Click 'Update Now' if available, or manually update to version 8.5.5 or later.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Block malicious parameter values containing script tags or JavaScript code

WAF-specific configuration required

Disable Vulnerable Plugin

linux

Temporarily disable the plugin until patched

wp plugin deactivate wp-cart-for-digital-products

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Educate users about not clicking untrusted links, especially administrators

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins

Check Version:

wp plugin get wp-cart-for-digital-products --field=version

Verify Fix Applied:

Confirm plugin version is 8.5.5 or later and test parameter injection

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values containing script tags in web server logs
  • Multiple requests with similar malicious payloads

Network Indicators:

  • HTTP requests with suspicious parameters containing JavaScript code

SIEM Query:

web.url:*wp-cart-for-digital-products* AND (web.param:*<script* OR web.param:*javascript:* OR web.param:*onerror=*)

🔗 References

📤 Share & Export