Custom Fonts Vulnerability – Authenticated (Author+) Stored Cross-Site Scripting – CVE-2024-1332 | WordPress Plugin Vulnerability Report

Plugin Name: Custom Fonts

Key Information:

  • Software Type: Plugin
  • Software Slug: custom-fonts
  • Software Status: Active
  • Software Author: brainstormforce
  • Software Downloads: 4,030,759
  • Active Installs: 300,000
  • Last Updated: May 23, 2024
  • Patched Versions: 2.1.5
  • Affected Versions: <= 2.1.4

Vulnerability Details:

  • Name: Custom Fonts – Host Your Fonts Locally <= 2.1.4 - Authenticated (Author+) Stored Cross-Site Scripting
  • Type: Stored Cross-Site Scripting
  • CVE: CVE-2024-1332
  • CVSS Score: 6.4 (Medium)
  • Publicly Published: May 23, 2024
  • Researcher: James Myers
  • Description: The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Summary:

The Custom Fonts plugin for WordPress has a vulnerability in versions up to and including 2.1.4 that allows authenticated attackers with author level or higher to inject arbitrary web scripts via svg file upload due to insufficient input sanitization and output escaping. This vulnerability has been patched in version 2.1.5.

Detailed Overview:

James Myers discovered a stored cross-site scripting vulnerability in the Custom Fonts – Host Your Fonts Locally plugin for WordPress. The vulnerability exists in all versions up to and including 2.1.4 and is caused by insufficient input sanitization and output escaping when uploading svg files. This makes it possible for authenticated attackers, with author level or higher privileges, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Successful exploitation of this vulnerability could allow attackers to steal sensitive information, modify the appearance of the site, or redirect users to malicious sites.

Advice for Users:

  1. Immediate Action: Update the Custom Fonts plugin to version 2.1.5 or later immediately.
  2. Check for Signs of Vulnerability: Review your site's pages, especially those allowing svg file uploads, for any suspicious scripts or unauthorized modifications.
  3. Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
  4. Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.

The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.1.5 or later to secure their WordPress installations.

References:

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/custom-fonts

https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/custom-fonts/custom-fonts-host-your-fonts-locally-214-authenticated-author-stored-cross-site-scripting

Detailed Report:

As a website owner, ensuring the security of your site should be a top priority. Neglecting to keep your WordPress plugins up to date can leave your site vulnerable to various security threats, potentially compromising your data and your users' trust. A recent vulnerability discovered in the Custom Fonts plugin serves as a stark reminder of the importance of staying vigilant and updating your plugins regularly.

Custom Fonts Plugin Vulnerability Details

The Custom Fonts plugin, which boasts over 300,000 active installations, was found to have a stored cross-site scripting (XSS) vulnerability in versions up to and including 2.1.4. This vulnerability, identified as CVE-2024-1332, allows authenticated attackers with author-level or higher privileges to inject malicious scripts into pages via svg file upload due to insufficient input sanitization and output escaping.

Risks and Potential Impacts

Successful exploitation of this vulnerability could allow attackers to steal sensitive information, modify the appearance of the site, or redirect users to malicious sites. This could result in a loss of user trust, damage to your brand's reputation, and potential financial losses.

Remediating the Vulnerability

To address this issue, the plugin developers have promptly released a patch in version 2.1.5. Website owners are strongly advised to update their Custom Fonts plugin to version 2.1.5 or later immediately. Additionally, site owners should review their site's pages, especially those allowing svg file uploads, for any suspicious scripts or unauthorized modifications.

Overview of Previous Vulnerabilities

This is not the first time the Custom Fonts plugin has faced security issues. In the past, the plugin has dealt with similar cross-site scripting vulnerabilities, highlighting the ongoing need for website owners to stay informed about potential security risks and take prompt action when necessary.

The Importance of Staying Vigilant

As a small business owner with a WordPress website, it can be challenging to find the time to stay on top of security vulnerabilities. However, the potential consequences of neglecting your site's security cannot be overstated. By regularly updating your plugins, monitoring your site for suspicious activity, and partnering with experienced professionals when needed, you can significantly reduce the risk of falling victim to security threats.

If you are unsure about the security status of your WordPress site or feel overwhelmed by the prospect of dealing with potential vulnerabilities, don't hesitate to seek help. Investing in your website's security is an investment in the long-term success and stability of your online presence.

Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.

Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.

Custom Fonts Vulnerability – Authenticated (Author+) Stored Cross-Site Scripting – CVE-2024-1332 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment