ProfilePress Vulnerability- Authenticated Stored Cross-Site Scripting via Shortcode – CVE-2024-1535 | WordPress Plugin Vulnerability Report
Plugin Name: Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
Key Information:
- Software Type: Plugin
- Software Slug: wp-user-avatar
- Software Status: Active
- Software Author: collizo4sky
- Software Downloads: 12,610,237
- Active Installs: 200,000
- Last Updated: March 14, 2024
- Patched Versions: 4.15.3
- Affected Versions: <= 4.15.2
Vulnerability Details:
- Name: ProfilePress <= 4.15.2
- Title: Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
- Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- CVE: CVE-2024-1535
- CVSS Score: 6.4
- Publicly Published: March 12, 2024
- Researcher: Arkadiusz Hydzik
- Description: ProfilePress, a versatile WordPress plugin designed for creating membership sites, user registration forms, and more, has been identified with a vulnerability in versions up to 4.15.2. This flaw, CVE-2024-1535, arises from insufficient input sanitization and output escaping within the plugin's shortcodes, allowing authenticated users with at least contributor-level permissions to perform Stored Cross-Site Scripting (XSS) attacks. These attacks can inject harmful scripts into web pages, which are executed when the pages are accessed by other users.
Summary:
ProfilePress, a widely used plugin that extends WordPress functionality for membership and user profile management, has encountered a significant security issue in versions up to and including 4.15.2. This vulnerability, attributed to inadequate sanitization of user-supplied attributes within the plugin's shortcodes, permits authenticated Stored Cross-Site Scripting attacks, jeopardizing site security and user data integrity. The issue has been rectified in the subsequent version, 4.15.3, ensuring the plugin's safe usage moving forward.
Detailed Overview:
The vulnerability was brought to light by cybersecurity researcher Arkadiusz Hydzik, highlighting the critical nature of thorough input sanitization in web development, especially in plugins that process user-generated content. The ability of contributors or higher-level users to exploit this vulnerability underscores the necessity of robust security protocols in plugin development and user role management within WordPress sites.
Advice for Users:
- Immediate Action: It is crucial for users of the ProfilePress plugin to upgrade to version 4.15.3 promptly. This update addresses the XSS vulnerability, enhancing the security of WordPress sites utilizing the plugin.
- Check for Signs of Vulnerability: Site administrators are advised to closely monitor their websites for any indications of unauthorized script injections or alterations, particularly in areas where shortcodes are utilized.
- Alternate Plugins: While the patched version mitigates the identified risk, users may explore alternative plugins offering similar functionalities with potentially different or additional security measures.
- Stay Updated: The significance of maintaining up-to-date installations of all WordPress components cannot be overstated. Regular updates are pivotal in protecting against known vulnerabilities and ensuring optimal website functionality and security.
Conclusion:
The swift mitigation of CVE-2024-1535 in the ProfilePress plugin underscores the ever-present need for vigilance and proactive measures in digital security within the WordPress ecosystem. For small business owners and website administrators, particularly those with limited technical resources, the commitment to regular software updates and adherence to security best practices is paramount in safeguarding digital assets and sustaining user trust in an increasingly complex cybersecurity landscape.