CVE-2024-9230

5.9 MEDIUM

📋 TL;DR

The PowerPress Podcasting plugin for WordPress before version 11.9.18 has a stored cross-site scripting (XSS) vulnerability. Author-level users or higher can inject malicious scripts into podcast settings, which execute when administrators view those settings. This affects WordPress sites using vulnerable versions of the PowerPress plugin.

💻 Affected Systems

Products:
  • PowerPress Podcasting plugin by Blubrry
Versions: All versions before 11.9.18
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with PowerPress plugin and at least one user with author privileges or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with author privileges could inject malicious JavaScript that steals administrator session cookies, leading to full site compromise and potential data exfiltration.

🟠

Likely Case

Malicious authors could inject scripts that redirect users, display fake content, or perform limited actions within the WordPress admin interface.

🟢

If Mitigated

With proper user access controls and content security policies, the impact is limited to the admin interface with no data loss.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires author-level access to WordPress. The vulnerability is in podcast settings fields that lack proper input sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.9.18

Vendor Advisory: https://wpscan.com/vulnerability/ab5eaf57-fb61-4a08-b439-42dea40b7914/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find PowerPress Podcasting plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 11.9.18+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the PowerPress plugin until patched

wp plugin deactivate powerpress
wp plugin delete powerpress

Restrict user roles

all

Temporarily remove author privileges from untrusted users

wp user update <username> --role=subscriber

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Regularly audit user accounts and remove unnecessary author-level privileges

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for PowerPress version number

Check Version:

wp plugin get powerpress --field=version

Verify Fix Applied:

Verify PowerPress plugin version is 11.9.18 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to podcast settings by author-level users
  • JavaScript payloads in WordPress database wp_options table

Network Indicators:

  • Unexpected JavaScript loading from WordPress admin pages

SIEM Query:

source="wordpress.log" AND "powerpress" AND ("update_option" OR "add_podcast")

🔗 References

📤 Share & Export