Exploit
CVE-2024-10592

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) (CWE-80)

Published: Nov 16, 2024 / Updated: 3d ago

010
CVSS 6.4EPSS 0.05%Medium
CVE info copied to clipboard

Summary

The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0. This vulnerability is due to insufficient input sanitization and output escaping. It allows authenticated attackers with Contributor-level access and above to inject arbitrary web scripts into pages. These injected scripts will execute whenever a user accesses the affected page.

Impact

This vulnerability can have significant impacts: 1. Data theft: Attackers could potentially steal sensitive information from users who view the affected pages, including session cookies, authentication tokens, or other personal data. 2. Account takeover: The injected scripts could be used to perform actions on behalf of the victim, potentially leading to account compromise. 3. Malware distribution: Attackers could inject scripts that redirect users to malicious sites or download malware onto their devices. 4. Defacement: The appearance and content of the affected pages could be altered, potentially damaging the site's reputation. 5. Phishing: Injected scripts could create convincing phishing forms to steal user credentials. The impact is heightened by the fact that the XSS is stored, meaning the malicious script persists on the server and affects all users who view the compromised page, not just the initial target.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the time this vulnerability was reported, a patch was not explicitly mentioned. However, given that the vulnerability affects "all versions up to, and including, 1.6.0" of the Mapster WP Maps plugin, it is likely that a patched version (presumably 1.6.1 or higher) will be or has been released. Users should check for updates to the Mapster WP Maps plugin and apply them as soon as they become available.

Mitigation

Until a patch is available, consider the following mitigation strategies: 1. Temporarily disable the Mapster WP Maps plugin if it's not critical to your website's functionality. 2. Limit user roles: Restrict Contributor-level access and above to only trusted users, as the vulnerability requires authentication. 3. Implement Web Application Firewall (WAF) rules to detect and block XSS attempts. 4. Regularly audit and review user-generated content, especially from users with Contributor-level access and above. 5. Implement Content Security Policy (CSP) headers to mitigate the impact of successful XSS attacks. 6. Educate users about the risks of clicking on suspicious links or interacting with unexpected content on the website. 7. Monitor logs for suspicious activities related to the Mapster WP Maps plugin. Once a patch is available, prioritize its application immediately to resolve the vulnerability.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Timeline

CVE Assignment

NVD published the first details for CVE-2024-10592

Nov 16, 2024 at 10:15 AM
First Article

Feedly found the first article mentioning CVE-2024-10592. See article

Nov 16, 2024 at 10:21 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 16, 2024 at 10:21 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 15.3%)

Nov 17, 2024 at 9:45 AM
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Nov 19, 2024 at 2:12 AM
Static CVE Timeline Graph

Affected Systems

Mapster/wpmap
+null more

Exploits

https://github.com/windz3r0day/CVE-2024-10592
+null more

Attack Patterns

CAPEC-18: XSS Targeting Non-Script Elements
+null more

News

CVE-2024-10592 Exploit
CVE Id : CVE-2024-10592 Published Date: 2024-11-18T20:34:38+00:00 The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. inTheWild added a link to an exploit: https://github.com/windz3r0day/CVE-2024-10592
windz3r0day/CVE-2024-10592
[GitHub]CVE-2024-10592 poc exploit
CVE Alert: CVE-2024-10592
Everyone that supports the site helps enable new functionality. The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping.
CVE-2024-10592
Medium Severity Description The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the popup class parameter in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Read more at https://www.tenable.com/cve/CVE-2024-10592
CVE-2024-10592
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI