CVE-2024-8983

4.8 MEDIUM

📋 TL;DR

The Custom Twitter Feeds WordPress plugin before version 2.2.3 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is restricted. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Custom Twitter Feeds WordPress Plugin
Versions: All versions before 2.2.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled. Exploitation requires admin-level privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious admin or compromised admin account injects tracking scripts or defaces the site by modifying plugin settings pages that other users access.

🟢

If Mitigated

With proper access controls and admin account security, impact is limited to authorized administrators intentionally misusing their privileges.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access to WordPress. The vulnerability is in plugin settings that admins can modify.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.3

Vendor Advisory: https://wpscan.com/vulnerability/29194dde-8d11-4096-a5ae-1d69c2c5dc33/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Custom Twitter Feeds'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.2.3+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate custom-twitter-feeds

Restrict Admin Access

all

Limit admin account access to trusted personnel only and implement strong authentication

🧯 If You Can't Patch

  • Remove admin access from untrusted users and implement principle of least privilege
  • Implement web application firewall (WAF) rules to block XSS payloads in plugin settings

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Custom Twitter Feeds → Version number. If version is below 2.2.3, you are vulnerable.

Check Version:

wp plugin get custom-twitter-feeds --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.2.3 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to plugin settings by admin users
  • JavaScript payloads in plugin option values in database

Network Indicators:

  • Unexpected external script loads from plugin settings pages

SIEM Query:

source="wordpress" AND (event="plugin_updated" plugin="custom-twitter-feeds" version<"2.2.3") OR (event="option_update" option_name LIKE "ctf_%")

🔗 References

📤 Share & Export