CVE-2024-7084

4.8 MEDIUM

📋 TL;DR

This vulnerability in Ajax Search Lite WordPress plugin allows authenticated users with admin privileges to inject malicious scripts via unsanitized parameters. Attackers can execute arbitrary JavaScript in victims' browsers when they view affected pages. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Ajax Search Lite WordPress Plugin
Versions: All versions before 4.12.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Ajax Search Lite plugin and at least one user with admin privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Admin-level attacker steals session cookies, redirects users to malicious sites, or performs actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Admin-level attacker defaces website, injects cryptocurrency miners, or steals admin session cookies to gain persistent access.

🟢

If Mitigated

With proper user role management and admin account security, impact is limited to the specific admin account that was compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin-level access. The vulnerability is publicly documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.12.1

Vendor Advisory: https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ajax Search Lite plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.12.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate ajax-search-lite

Restrict Admin Access

all

Implement strict access controls and monitoring for admin accounts

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Enable WordPress security plugins with XSS protection features

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins → Installed Plugins. Look for Ajax Search Lite version number.

Check Version:

wp plugin get ajax-search-lite --field=version

Verify Fix Applied:

Confirm plugin version is 4.12.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity, unexpected plugin modifications, or suspicious parameter values in search requests

Network Indicators:

  • HTTP requests with script tags or JavaScript in search parameters to WordPress admin-ajax.php

SIEM Query:

source="wordpress.log" AND ("ajax-search-lite" OR "admin-ajax.php") AND ("<script>" OR "javascript:" OR suspicious parameter values)

🔗 References

📤 Share & Export