[Urgent] Unauthenticated Stored XSS in Newsmag Plugin (<5.0) ** CVE-2021-24304 **
π Vulnerability Details:
π Technical Analysis:
The vulnerability exists in the td_ajax_block
AJAX handler, where the td_block_id
parameter fails to sanitize user input. Attackers can inject malicious JavaScript payloads that execute when WordPress administrators view affected pages.
π Proof of Concept:
http
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: vulnerable-site.com
[...]
Content-Type: application/x-www-form-urlencoded
action=td_ajax_block&td_block_id="><svg/onload=alert('XSS')>&[...]
π― Attack Scenario:
- Attacker sends crafted request to
admin-ajax.php
- Malicious payload stores in database
- Payload executes when admin views plugin pages
- Full admin compromise possible
π‘οΈ Recommended Actions:
- Immediate Update: Upgrade to Newsmag 5.0+
- Temporary Fix: Add input sanitization for
td_block_id
- Monitoring: Check logs for suspicious POST requests to
admin-ajax.php
- Security Layers:
- Implement Content Security Policy (CSP)
- Add WAF rules to block XSS patterns
π References:
π¬ Discussion Points:
- Has anyone observed active exploitation?
- Alternative mitigation strategies?
#WordPressSecurity #WebAppSec #VulnerabilityManagement