Redux Framework Vulnerability – Unauthenticated JSON File Upload to Stored Cross-Site Scripting – CVE-2024-6828 | WordPress Plugin Vulnerability Report
Plugin Name: Redux Framework
Key Information:
- Software Type: Plugin
- Software Slug: redux-framework
- Software Status: Active
- Software Author: davidanderson
- Software Downloads: 26,600,180
- Active Installs: 1,000,000
- Last Updated: July 29, 2024
- Patched Versions: 4.4.18
- Affected Versions: 4.4.12 - 4.4.17
Vulnerability Details:
- Name: Redux Framework 4.4.12 - 4.4.17
- Type: Unauthenticated JSON File Upload to Stored Cross-Site Scripting
- CVE: CVE-2024-6828
- CVSS Score: 7.2
- Publicly Published: July 22, 2024
- Researcher: villu164
- Description: The Redux Framework plugin for WordPress is vulnerable to unauthenticated JSON file uploads due to missing authorization and capability checks on the
Redux_Color_Scheme_Import
function in versions 4.4.12 to 4.4.17. This vulnerability allows unauthenticated attackers to upload JSON files that can be used to conduct stored cross-site scripting attacks. In rare cases, when thewp_filesystem
fails to initialize, it could lead to remote code execution.
Summary:
The Redux Framework plugin for WordPress has a vulnerability in versions 4.4.12 to 4.4.17 that allows for unauthenticated JSON file uploads, which can lead to stored cross-site scripting attacks. This vulnerability has been patched in version 4.4.18.
Detailed Overview:
The vulnerability, discovered by researcher villu164, is due to the lack of proper authorization and capability checks in the Redux_Color_Scheme_Import
function. This flaw allows attackers to upload JSON files without authentication, potentially embedding malicious scripts in the files. The impact includes stored cross-site scripting, which can be used to compromise the security of a site, and in rare cases, if wp_filesystem
initialization fails, it could escalate to remote code execution.
Advice for Users:
Immediate Action: Users should update to the patched version 4.4.18 immediately to protect their websites from potential exploits. Check for Signs of Vulnerability: Users should monitor their websites for unusual activities, such as unauthorized file uploads or unexpected changes in site behavior, which could indicate a compromise. Alternate Plugins: While a patch is available, users might consider exploring alternative plugins with similar functionality and robust security features as a precaution. Stay Updated: Regularly updating plugins to the latest versions is crucial for maintaining website security and protecting against known vulnerabilities.
Conclusion:
The prompt response from the Redux Framework developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 4.4.18 or later to secure their WordPress installations.