CVE-2024-9599

5.4 MEDIUM

📋 TL;DR

The Popup Box WordPress plugin before version 4.7.8 contains a stored cross-site scripting (XSS) vulnerability in plugin settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite configurations where unfiltered_html is restricted. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Popup Box WordPress Plugin
Versions: All versions before 4.7.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Popup Box plugin installed. Exploitation requires administrator-level access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Malicious admin or compromised admin account injects tracking scripts, defaces content, or steals user session data from visitors viewing pages with the vulnerable popup.

🟢

If Mitigated

With proper access controls and admin account security, the vulnerability remains dormant as it requires admin privileges to exploit.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access to WordPress. The vulnerability is in plugin settings that aren't properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.8

Vendor Advisory: https://wpscan.com/vulnerability/9e8a2659-7a6c-4528-b0b2-64d462485b43/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Popup Box' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.7.8+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the Popup Box plugin until patched

wp plugin deactivate popup-box
wp plugin delete popup-box

Restrict admin access

all

Implement strict access controls and monitoring for admin accounts

🧯 If You Can't Patch

  • Implement strict monitoring of admin user activities and plugin settings changes
  • Use web application firewall (WAF) rules to block XSS payloads in POST requests to admin-ajax.php and plugin settings pages

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Popup Box version. If version is below 4.7.8, system is vulnerable.

Check Version:

wp plugin get popup-box --field=version

Verify Fix Applied:

Verify Popup Box plugin version is 4.7.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php with script tags in parameters
  • Admin user modifying popup box settings with JavaScript payloads
  • Changes to popup-box plugin settings from unexpected IP addresses

Network Indicators:

  • POST requests containing script tags to /wp-admin/admin-ajax.php with action parameters related to popup box

SIEM Query:

source="wordpress.log" AND ("popup-box" OR "admin-ajax.php") AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export