CVE-2024-7758

4.8 MEDIUM

📋 TL;DR

The Stylish Price List WordPress plugin before version 7.1.8 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated users with contributor-level privileges or higher to inject malicious scripts that execute when other users view affected pages. The vulnerability bypasses WordPress's unfiltered_html restriction, making it particularly dangerous in multisite configurations.

💻 Affected Systems

Products:
  • WordPress Stylish Price List plugin
Versions: All versions before 7.1.8
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects WordPress multisite installations where unfiltered_html capability is disallowed, but also affects standard WordPress installations with contributor-level users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with contributor access could inject malicious JavaScript that steals administrator credentials, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Authenticated attackers inject malicious scripts into plugin settings that execute when administrators or other users view those settings pages, potentially stealing session cookies or performing unauthorized actions.

🟢

If Mitigated

With proper user access controls and regular security monitoring, the impact is limited to potential data exposure from affected user sessions, but site functionality remains intact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher. The vulnerability is in plugin settings that lack proper input sanitization and output escaping.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.8

Vendor Advisory: https://wpscan.com/vulnerability/0bf39a29-a605-407b-9ab0-a82437d16153/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Stylish Price List' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 7.1.8+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Remove Contributor Access

all

Temporarily remove contributor-level access to the WordPress site until patching can be completed.

Disable Plugin

linux

Deactivate the Stylish Price List plugin if not critically needed.

wp plugin deactivate stylish-price-list

🧯 If You Can't Patch

  • Implement strict user access controls and limit contributor privileges
  • Deploy web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Stylish Price List version. If version is below 7.1.8, the site is vulnerable.

Check Version:

wp plugin get stylish-price-list --field=version

Verify Fix Applied:

Verify plugin version shows 7.1.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin settings endpoints
  • JavaScript payloads in plugin-related form submissions

Network Indicators:

  • Suspicious script tags in HTTP requests to wp-admin/admin-ajax.php or plugin-specific endpoints

SIEM Query:

source="wordpress.log" AND ("stylish-price-list" OR "spl_settings") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export