CVE-2024-8542

4.8 MEDIUM

📋 TL;DR

The Everest Forms WordPress plugin before version 3.0.3.1 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is restricted. Only WordPress sites using vulnerable Everest Forms versions are affected.

💻 Affected Systems

Products:
  • Everest Forms WordPress Plugin
Versions: All versions before 3.0.3.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. Affects both single-site and multisite WordPress installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Malicious admin or compromised admin account injects tracking scripts, defaces content, or steals limited user data through XSS payloads in plugin settings.

🟢

If Mitigated

With proper access controls and admin account security, impact is limited to potential defacement or nuisance scripts affecting plugin settings pages only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges. Attack involves injecting JavaScript into plugin settings fields that lack proper sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.3.1

Vendor Advisory: https://wpscan.com/vulnerability/e5f94dcf-a6dc-4c4c-acb6-1a7ead701053/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Everest Forms and click 'Update Now'. 4. Verify version shows 3.0.3.1 or higher.

🔧 Temporary Workarounds

Remove Admin Access from Untrusted Users

all

Limit admin privileges to trusted personnel only to prevent exploitation.

Disable Everest Forms Plugin

linux

Temporarily disable the plugin until patching is possible.

wp plugin deactivate everest-forms

🧯 If You Can't Patch

  • Restrict admin account access to only essential personnel and implement strong authentication.
  • Implement web application firewall (WAF) rules to block XSS payloads in plugin settings requests.

🔍 How to Verify

Check if Vulnerable:

Check Everest Forms plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 3.0.3.1, the system is vulnerable.

Check Version:

wp plugin get everest-forms --field=version

Verify Fix Applied:

Confirm Everest Forms version is 3.0.3.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to Everest Forms settings by admin users
  • POST requests to Everest Forms settings endpoints containing script tags or JavaScript

Network Indicators:

  • HTTP requests to /wp-admin/admin.php?page=evf-settings with suspicious payloads

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query="page=evf-settings") AND (body CONTAINS "<script>" OR body CONTAINS "javascript:")

🔗 References

📤 Share & Export