CVE-2024-9674

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Oct 18, 2024 / Updated: 32d ago

010
CVSS 5.4EPSS 0.05%Medium
CVE info copied to clipboard

Summary

The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in versions up to and including 1.1.2. This vulnerability is due to insufficient input sanitization and output escaping. It allows authenticated attackers with Author-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

Impact

This vulnerability could allow attackers to inject malicious scripts into SVG files uploaded to the WordPress site. When users view these SVG files, the malicious scripts would execute in their browsers. This could lead to various attacks, including: 1. Stealing user session cookies, potentially allowing attackers to impersonate users. 2. Defacing the website by modifying its appearance to visitors. 3. Injecting malicious content or redirects to phishing sites. 4. Performing actions on behalf of the user without their knowledge. 5. Accessing sensitive information available to the user's browser. The impact is somewhat limited as it requires an authenticated user with at least Author-level permissions, and user interaction is required for the attack to be successful.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been fixed in a newer version of the plugin. Users should update to version 1.1.3 or later of the Debrandify plugin to mitigate this vulnerability.

Mitigation

To mitigate this vulnerability, the following steps are recommended: 1. Update the Debrandify plugin to version 1.1.3 or later immediately. 2. If immediate updating is not possible, consider temporarily disabling the plugin until it can be updated. 3. Implement strong user access controls and limit the number of users with Author-level permissions or above. 4. Regularly audit user accounts and their permission levels. 5. Implement additional security measures such as Web Application Firewalls (WAF) that can help detect and prevent XSS attacks. 6. Educate users about the risks of accessing untrusted SVG files on the website. 7. Regularly scan and monitor the website for any signs of compromise or suspicious activity. 8. Keep all WordPress core files, themes, and other plugins up to date as well.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9674. See article

Oct 18, 2024 at 11:14 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 18, 2024 at 11:14 AM
CVE Assignment

NVD published the first details for CVE-2024-9674

Oct 18, 2024 at 11:15 AM
CVSS

A CVSS base score of 6.4 has been assigned.

Oct 18, 2024 at 11:20 AM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 22%)

Oct 19, 2024 at 9:48 AM
CVSS

A CVSS base score of 5.4 has been assigned.

Oct 22, 2024 at 2:12 PM / nvd
Static CVE Timeline Graph

Affected Systems

Tahoe/debrandify
+null more

Patches

plugins.trac.wordpress.org
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

News

Wordfence Intelligence Weekly WordPress Vulnerability Report (October 14, 2024 to October 20, 2024)
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week: WordPress Plugins with Reported Vulnerabilities Last Week
CVE Alert: CVE-2024-9674 - https://www.redpacketsecurity.com/cve_alert_cve-2024-9674/ #OSINT #ThreatIntel #CyberSecurity #cve_2024_9674
CVE Alert: CVE-2024-9674 - redpacketsecurity.com/cve_al… #OSINT #ThreatIntel #CyberSecurity #cve_2024_9674
CVE Alert: CVE-2024-9674
The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. Everyone that supports the site helps enable new functionality.
CVE-2024-9674
Medium Severity Description The Debrandify · Remove or Replace WordPress Branding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. Read more at https://www.tenable.com/cve/CVE-2024-9674
CVE-2024-9674
Gravedad 3.1 (CVSS 3.1 Base Score) Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
See 8 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI