CVE-2024-6529

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into WordPress admin pages through the Ultimate Classified Listings plugin. When high-privilege users like administrators view pages containing the malicious scripts, attackers can steal session cookies, redirect users, or perform actions on their behalf. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Ultimate Classified Listings WordPress Plugin
Versions: All versions before 1.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the plugin and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full administrative access to the WordPress site, install backdoors, deface the site, or exfiltrate sensitive data.

🟠

Likely Case

Attackers would use phishing to trick administrators into clicking malicious links, leading to session hijacking and limited administrative actions before detection.

🟢

If Mitigated

With proper input validation and output escaping, the attack would fail completely with no impact on the system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is a classic reflected XSS that requires user interaction (admin clicking a malicious link) but is trivial to exploit once the link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4

Vendor Advisory: https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Ultimate Classified Listings'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.4+ from WordPress.org and replace the plugin files via FTP/SFTP.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate ultimate-classified-listings

Web Application Firewall Rule

all

Block malicious parameter patterns at the WAF level

Add WAF rule to block requests containing script tags in the vulnerable parameter

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution
  • Use browser security extensions that block reflected XSS attacks for admin users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Ultimate Classified Listings → Version number. If version is below 1.4, the site is vulnerable.

Check Version:

wp plugin get ultimate-classified-listings --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.4 or higher in the WordPress plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests containing script tags or JavaScript in URL parameters
  • Multiple failed login attempts from new IPs following suspicious parameter requests

Network Indicators:

  • HTTP requests with encoded script payloads in query parameters
  • Outbound connections to unknown domains following admin page visits

SIEM Query:

source="wordpress.log" AND ("ultimate-classified" OR "classified-listings") AND ("<script" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export