CVE-2024-8107
📋 TL;DR
The Slider Revolution WordPress plugin allows authenticated attackers with Author-level access or higher to upload malicious SVG files containing cross-site scripting payloads. These scripts execute when users view the SVG files, potentially compromising visitor browsers. By default only administrators can exploit this, but plugin permissions can be extended to authors.
💻 Affected Systems
- Slider Revolution WordPress Plugin
📦 What is this software?
Slider Revolution by Themepunch
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or perform actions on behalf of authenticated users.
Likely Case
Attackers with author access inject malicious scripts to steal visitor session cookies or credentials, potentially leading to account compromise.
If Mitigated
With proper user access controls limiting who can upload SVG files, impact is reduced to only trusted administrators.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple - just uploading a malicious SVG file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.7.19
Vendor Advisory: https://www.sliderrevolution.com/documentation/changelog/#6-7-19
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Slider Revolution. 4. Click 'Update Now' if available, or download version 6.7.19+ from sliderrevolution.com. 5. Upload and activate the updated plugin.
🔧 Temporary Workarounds
Disable SVG Uploads
allPrevent SVG file uploads through WordPress configuration or security plugins
Restrict User Roles
allLimit Slider Revolution plugin access to Administrators only
🧯 If You Can't Patch
- Remove Slider Revolution plugin entirely if not needed
- Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Slider Revolution → Version number. If version is 6.7.18 or lower, you are vulnerable.
Check Version:
wp plugin list --name=slider-revolution --field=version
Verify Fix Applied:
Verify Slider Revolution version is 6.7.19 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual SVG file uploads by non-admin users
- Multiple failed SVG upload attempts
Network Indicators:
- Requests to SVG files with suspicious parameters or scripts in URLs
SIEM Query:
source="wordpress" AND (event="plugin_update" AND plugin="slider-revolution" AND version<="6.7.18") OR (event="file_upload" AND file_extension="svg" AND user_role!="administrator")