Custom Fonts Vulnerability – Authenticated (Author+) Stored Cross-Site Scripting – CVE-2024-1332 | WordPress Plugin Vulnerability Report
Plugin Name: Custom Fonts
Key Information:
- Software Type: Plugin
- Software Slug: custom-fonts
- Software Status: Active
- Software Author: brainstormforce
- Software Downloads: 4,030,759
- Active Installs: 300,000
- Last Updated: May 23, 2024
- Patched Versions: 2.1.5
- Affected Versions: <= 2.1.4
Vulnerability Details:
- Name: Custom Fonts – Host Your Fonts Locally <= 2.1.4 - Authenticated (Author+) Stored Cross-Site Scripting
- Type: Stored Cross-Site Scripting
- CVE: CVE-2024-1332
- CVSS Score: 6.4 (Medium)
- Publicly Published: May 23, 2024
- Researcher: James Myers
- Description: The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Summary:
The Custom Fonts plugin for WordPress has a vulnerability in versions up to and including 2.1.4 that allows authenticated attackers with author level or higher to inject arbitrary web scripts via svg file upload due to insufficient input sanitization and output escaping. This vulnerability has been patched in version 2.1.5.
Detailed Overview:
James Myers discovered a stored cross-site scripting vulnerability in the Custom Fonts – Host Your Fonts Locally plugin for WordPress. The vulnerability exists in all versions up to and including 2.1.4 and is caused by insufficient input sanitization and output escaping when uploading svg files. This makes it possible for authenticated attackers, with author level or higher privileges, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Successful exploitation of this vulnerability could allow attackers to steal sensitive information, modify the appearance of the site, or redirect users to malicious sites.
Advice for Users:
- Immediate Action: Update the Custom Fonts plugin to version 2.1.5 or later immediately.
- Check for Signs of Vulnerability: Review your site's pages, especially those allowing svg file uploads, for any suspicious scripts or unauthorized modifications.
- Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
The prompt response from the plugin developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 2.1.5 or later to secure their WordPress installations.
References:
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/custom-fonts
Detailed Report:
Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.
Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.