Media Library Assistant Vulnerability – Authenticated (Contributor+) Stored Cross-Site Scripting via mla_gallery Shortcode – CVE-2024-2475 |WordPress Plugin Vulnerability Report
Plugin Name: Media Library Assistant
Key Information:
- Software Type: Plugin
- Software Slug: media-library-assistant
- Software Status: Active
- Software Author: dglingren
- Software Downloads: 1,901,312
- Active Installs: 70,000
- Last Updated: April 1, 2024
- Patched Versions: 3.14
- Affected Versions: <= 3.13
Vulnerability Details:
- Name: Media Library Assistant <= 3.13
- Title: Authenticated (Contributor+) Stored Cross-Site Scripting via mla_gallery Shortcode
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-2475
- CVSS Score: 6.4
- Publicly Published: March 28, 2024
- Researcher: stealthcopter
- Description: The Media Library Assistant plugin, an essential tool for managing media libraries on WordPress sites, is susceptible to Stored Cross-Site Scripting (XSS) in versions up to 3.13. The vulnerability stems from the plugin's handling of the 'mla_gallery' shortcode, where insufficient input sanitization and output escaping allow attackers with contributor-level access to inject malicious scripts. These scripts can be executed by users accessing the compromised pages, posing a significant security risk.
Summary:
The Media Library Assistant plugin, widely utilized for its advanced media management capabilities, has been identified to contain a Stored Cross-Site Scripting vulnerability in versions up to and including 3.13. This security risk has been effectively neutralized in the subsequent patch, version 3.14.
Detailed Overview:
Discovered by the cybersecurity researcher known as stealthcopter, this vulnerability highlights the critical importance of stringent input validation within plugins. By exploiting this vulnerability, authenticated users could introduce harmful scripts into web pages, compromising site integrity and user security. The release of version 3.14 by the plugin's developers promptly addresses this issue, reinforcing the plugin's defenses against such exploits.
Advice for Users:
- Immediate Action: Users of the Media Library Assistant plugin are urged to update to the patched version 3.14 without delay to fortify their sites against this vulnerability.
- Check for Signs of Vulnerability: Administrators should inspect their websites for any unusual activity or unauthorized content alterations, which may signal exploitation.
- Alternate Plugins: While the patched version resolves the immediate concern, users maintaining a cautious stance may explore alternative media library management plugins that fulfill similar needs.
- Stay Updated: Keeping all WordPress plugins up-to-date is paramount for securing your site from known vulnerabilities. Regular updates are a cornerstone of effective web security.
Conclusion:
The swift resolution of the Stored Cross-Site Scripting vulnerability within the Media Library Assistant plugin underscores the ongoing battle for digital security and the pivotal role of timely updates. By ensuring that their installations are updated to version 3.14 or later, users can safeguard their WordPress sites against this and potential future vulnerabilities, maintaining the trust and safety of their digital environments.
References:
- Wordfence Vulnerability Report for Media Library Assistant
- Wordfence Vulnerabilities for Media Library Assistant