CVE-2024-6462

4.8 MEDIUM

📋 TL;DR

The DL Yandex Metrika WordPress plugin through version 1.2 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite setups where unfiltered_html is restricted. Only WordPress sites using this specific plugin are affected.

💻 Affected Systems

Products:
  • DL Yandex Metrika WordPress Plugin
Versions: All versions through 1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled and an admin user account. Vulnerability exists even when unfiltered_html capability is disallowed (common in WordPress multisite setups).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Malicious admin injects tracking scripts or defaces the site by modifying plugin settings with XSS payloads that affect all users viewing those settings pages.

🟢

If Mitigated

With proper access controls limiting admin privileges to trusted users only, the vulnerability has minimal impact as it requires high-privilege access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin-level access to WordPress. The vulnerability is in plugin settings that don't properly sanitize input before storage and output.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.3 or later

Vendor Advisory: https://wpscan.com/vulnerability/0880fa33-3efa-4f50-83c8-4c90cb805eb9/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'DL Yandex Metrika' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin, then install version 1.3+ from WordPress repository.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Deactivate and delete the vulnerable plugin if Yandex Metrika functionality is not required

wp plugin deactivate dl-yandex-metrika
wp plugin delete dl-yandex-metrika

Restrict admin access

all

Limit WordPress admin privileges to only essential, trusted users

🧯 If You Can't Patch

  • Remove admin access from untrusted users and implement principle of least privilege
  • Deactivate the DL Yandex Metrika plugin entirely until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'DL Yandex Metrika' with version 1.2 or earlier

Check Version:

wp plugin get dl-yandex-metrika --field=version

Verify Fix Applied:

Verify plugin version is 1.3 or later in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to plugin settings by admin users
  • JavaScript payloads in plugin option values in database

Network Indicators:

  • External script loads from Yandex Metrika plugin pages that don't match expected patterns

SIEM Query:

source="wordpress" AND (event="plugin_updated" AND plugin_name="dl-yandex-metrika" AND version<="1.2") OR (event="plugin_activated" AND plugin_name="dl-yandex-metrika")

🔗 References

📤 Share & Export