BetterDocs Vulnerability – Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer for Elementor & Gutenberg – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode – CVE-2024-2845 | WordPress Plugin Vulnerability Report
Plugin Name: BetterDocs – Best Documentation, FAQ & Knowledge Base Plugin with AI Support & Instant Answer for Elementor & Gutenberg
Key Information:
- Software Type: Plugin
- Software Slug: betterdocs
- Software Status: Active
- Software Author: wpdevteam
- Software Downloads: 1,219,559
- Active Installs: 30,000
- Last Updated: March 26, 2024
- Patched Versions: 3.5.0
- Affected Versions: <= 3.4.2
Vulnerability Details:
- Name: BetterDocs <= 3.4.2 Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-2845
- CVSS Score: 6.4
- Publicly Published: March 25, 2024
- Researcher: Krzysztof Zając - CERT PL
- Description: The BetterDocs plugin is susceptible to Stored Cross-Site Scripting (XSS) via its shortcode(s) due to inadequate input sanitization and output escaping, allowing authenticated attackers (with contributor-level access or higher) to inject malicious scripts into pages that execute upon user access.
Summary:
The BetterDocs plugin for WordPress harbors a vulnerability in versions up to and including 3.4.2, wherein authenticated contributors can exploit Stored Cross-Site Scripting via shortcodes. This vulnerability has been addressed in version 3.5.0.
Detailed Overview:
This vulnerability, identified by Krzysztof Zając of CERT PL, arises from the plugin's failure to properly sanitize and escape user-supplied attributes within its shortcodes. Consequently, attackers with at least contributor privileges can inject arbitrary web scripts into pages, leading to potential compromises when such pages are accessed by unsuspecting users. The implications include unauthorized access to sensitive information and manipulation of web page content.
Advice for Users:
- Immediate Action: Update to the patched version 3.5.0 immediately.
- Check for Signs of Vulnerability: Monitor your site for unusual activities or unauthorized content modifications, which may indicate exploitation.
- Alternate Plugins: Consider exploring similar plugins as a precautionary measure, despite the availability of a patch.
- Stay Updated: Regularly updating your plugins is crucial for maintaining a secure WordPress environment.
Conclusion:
The swift action taken by the BetterDocs development team to rectify this vulnerability highlights the critical nature of keeping software up to date. Users are strongly advised to upgrade to version 3.5.0 or later to safeguard their WordPress installations against potential exploits.