CVE-2024-6889

4.8 MEDIUM

📋 TL;DR

This vulnerability allows administrators in WordPress multisite installations to inject malicious scripts into plugin settings, which then execute when other users view those settings. It affects WordPress sites using the Secure Copy Content Protection and Content Locking plugin with versions before 4.1.7, particularly in environments where unfiltered_html capability is restricted.

💻 Affected Systems

Products:
  • Secure Copy Content Protection and Content Locking WordPress plugin
Versions: All versions before 4.1.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress multisite setup or environments where unfiltered_html capability is disallowed for the vulnerability to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated admin could inject persistent malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions on behalf of other users when they view plugin settings pages.

🟠

Likely Case

Malicious admin or compromised admin account injects tracking scripts or defaces the plugin settings interface visible to other privileged users.

🟢

If Mitigated

Limited to plugin settings pages only, affecting only users with access to those administrative interfaces.

🌐 Internet-Facing: MEDIUM - WordPress admin interfaces are typically internet-facing, but exploitation requires admin credentials.
🏢 Internal Only: LOW - Same risk profile as internet-facing since admin interfaces are typically accessible from anywhere.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple XSS payload injection into plugin settings fields.

Exploitation requires admin-level credentials and access to plugin settings interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.7

Vendor Advisory: https://wpscan.com/vulnerability/9651abd1-0f66-418e-85a7-2de0c5e91bed/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Secure Copy Content Protection and Content Locking'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 4.1.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

linux

Temporarily deactivate and remove the plugin until patched version is available.

wp plugin deactivate secure-copy-content-protection
wp plugin delete secure-copy-content-protection

Restrict admin access

all

Implement IP whitelisting for WordPress admin interface to limit potential attackers.

# Add to .htaccess for Apache:
Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
# Add to nginx config:
location /wp-admin {
    allow 192.168.1.0/24;
    deny all;
}

🧯 If You Can't Patch

  • Remove admin privileges from untrusted users
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin → Plugins → Installed Plugins. If version is below 4.1.7, you are vulnerable.

Check Version:

wp plugin get secure-copy-content-protection --field=version

Verify Fix Applied:

Confirm plugin version is 4.1.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user activity modifying plugin settings
  • Multiple failed admin login attempts followed by successful login

Network Indicators:

  • HTTP POST requests to wp-admin/admin.php?page=secure-copy-content-protection with script tags in parameters

SIEM Query:

source="wordpress.log" AND ("admin.php" AND "secure-copy-content-protection") AND ("<script>" OR "javascript:")

🔗 References

📤 Share & Export