CVE-2024-6718

5.4 MEDIUM

📋 TL;DR

The PVN Auth Popup WordPress plugin through version 1.0.0 has a stored cross-site scripting (XSS) vulnerability in its shortcode attributes. This allows authenticated users with contributor-level permissions or higher to inject malicious scripts into pages/posts, which execute when other users view that content. The vulnerability affects WordPress sites using this specific plugin.

💻 Affected Systems

Products:
  • PVN Auth Popup WordPress Plugin
Versions: All versions through 1.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious JavaScript that steals administrator session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious contributors or compromised contributor accounts inject tracking scripts, deface content, or steal lower-privileged user session data from vulnerable pages.

🟢

If Mitigated

With proper user access controls and content moderation, the impact is limited to potential defacement of specific pages where the shortcode is used.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access. The vulnerability is in shortcode attribute handling, making exploitation straightforward for authenticated attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://wpscan.com/vulnerability/7d28ea72-8c3b-4607-b877-7b10d954fef9/

Restart Required: No

Instructions:

1. Remove the PVN Auth Popup plugin completely from your WordPress installation. 2. Verify no residual plugin files remain in wp-content/plugins/. 3. Consider alternative authentication popup plugins with proper security validation.

🔧 Temporary Workarounds

Disable Contributor Content Publishing

all

Temporarily restrict contributor users from publishing content until plugin is removed.

Use WordPress role management plugins or custom code to modify contributor capabilities

Content Security Policy (CSP)

all

Implement CSP headers to restrict script execution from untrusted sources.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Or use WordPress security plugins to configure CSP

🧯 If You Can't Patch

  • Immediately remove the PVN Auth Popup plugin from all WordPress installations.
  • Audit all posts/pages for malicious content and review contributor user accounts for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins for 'PVN Auth Popup' plugin. If installed and version is 1.0.0 or earlier, you are vulnerable.

Check Version:

WordPress CLI: wp plugin list --name='pvn-auth-popup' --field=version

Verify Fix Applied:

Confirm the PVN Auth Popup plugin is completely removed from wp-content/plugins/ directory and no longer appears in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content updates by contributor users
  • Posts/pages containing [pvn_auth_popup] shortcode with suspicious attribute values

Network Indicators:

  • Unexpected JavaScript loading from WordPress posts/pages
  • External script calls from content that should be static

SIEM Query:

source="wordpress" AND (event="post_updated" OR event="page_updated") AND user_role="contributor" AND content CONTAINS "[pvn_auth_popup"

🔗 References

📤 Share & Export