Simple Share Buttons Adder Vulnerability- Authenticated(Administrator+) Stored Cross-Site Scripting via CSS Settings – CVE-2024-0621 | WordPress Plugin Vulnerability Report

Plugin Name: Simple Share Buttons Adder

Key Information:

  • Software Type: Plugin
  • Software Slug: simple-share-buttons-adder
  • Software Status: Active
  • Software Author: davidoffneal
  • Software Downloads: 4,036,990
  • Active Installs: 70,000
  • Last Updated: February 16, 2024
  • Patched Versions: 8.4.12
  • Affected Versions: <= 8.4.11

Vulnerability Details:

  • Name: Simple Share Buttons Adder <= 8.4.11
  • Title: Authenticated(Administrator+) Stored Cross-Site Scripting via CSS Settings
  • Type: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-0621
  • CVSS Score: 4.4
  • Publicly Published: February 14, 2024
  • Researcher: Akbar Kustirama
  • Description: The Simple Share Buttons Adder plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) through its admin settings in versions up to and including 8.4.11. This vulnerability arises due to inadequate input sanitization and output escaping, allowing authenticated attackers with administrator-level permissions to inject arbitrary web scripts into pages. These scripts can then execute whenever a user accesses an injected page, specifically affecting multi-site installations and those with unfiltered_html disabled.


The Simple Share Buttons Adder plugin harbors a vulnerability in versions up to and including 8.4.11 that enables authenticated attackers with administrator-level permissions to execute stored cross-site scripting attacks via CSS settings. This issue has been addressed in the recent update, version 8.4.12.

Detailed Overview:

Discovered by researcher Akbar Kustirama, this vulnerability specifically targets the plugin's CSS settings feature, allowing attackers to inject harmful scripts that can compromise the website's integrity and user security. The vulnerability is particularly concerning for multi-site WordPress installations and instances where the unfiltered_html capability is disabled, as it can provide attackers with a gateway to perform malicious actions ranging from defacing the website to stealing sensitive data. The correction of this vulnerability in version 8.4.12 is a crucial update that all users of the plugin should apply immediately to safeguard their websites.

Advice for Users:

Immediate Action: Users must update to version 8.4.12 without delay to protect their sites from this security flaw.
Check for Signs of Vulnerability: Website administrators should monitor their sites for unusual or unauthorized modifications, particularly in CSS settings, and review user access logs to detect potential unauthorized activities.
Alternate Plugins: Even though the vulnerability has been patched, considering alternative sharing button plugins could provide an additional layer of security and functionality.
Stay Updated: Keeping all WordPress components, including themes and plugins, up-to-date is essential for maintaining a secure online presence and preventing potential vulnerabilities.


The swift action taken by the Simple Share Buttons Adder development team to release a patch for this vulnerability highlights the critical nature of regular software updates. To ensure the security of WordPress sites, it is imperative for users to install version 8.4.12 or later, thereby preventing any exploitation of this vulnerability.


In today's digital ecosystem, where websites serve as the cornerstone of businesses and personal endeavors alike, the importance of cybersecurity cannot be overstated. The discovery of a significant vulnerability in the widely utilized Simple Share Buttons Adder plugin for WordPress serves as a stark reminder of the latent risks in the digital tools we often take for granted. This vulnerability, identified as CVE-2024-0621, highlights the ongoing battle between advancing technology and the need for robust security measures to protect our digital assets.

Vulnerability Details:

The vulnerability in question, CVE-2024-0621, exposes websites to stored cross-site scripting (XSS) attacks via the plugin's CSS settings. Authenticated users with administrative privileges can inject arbitrary web scripts into pages, which are then executed by any user accessing the page. This security flaw, discovered by researcher Akbar Kustirama, was publicly announced on February 14, 2024, and carries a CVSS score of 4.4, indicating a moderate level of risk.

Risks and Impacts:

The exploitation of this vulnerability can lead to several adverse outcomes, including unauthorized access to sensitive information, manipulation of website content, and the distribution of malware to unsuspecting visitors. For small business owners, such breaches can result in significant reputational damage, loss of customer trust, and potential financial liabilities.

Remediation Steps:

In response to this discovery, an updated version of the plugin, 8.4.12, was released, addressing the vulnerability and fortifying the plugin against similar exploits. Users are strongly advised to update their installations immediately to this latest version. Additionally, website administrators should conduct regular reviews of user roles and permissions, ensuring that only trusted individuals have administrative access.

Historical Context:

This is not the first vulnerability identified in the Simple Share Buttons Adder plugin. Since June 26, 2014, there have been four documented vulnerabilities, underscoring the necessity for continuous vigilance and prompt updates.


The prompt response by the plugin's developers to mitigate CVE-2024-0621 underscores a critical aspect of digital stewardship - the importance of timely updates. For small business owners managing WordPress websites, staying informed about potential vulnerabilities and maintaining updated installations is imperative. It's a continuous effort that not only safeguards your digital presence but also protects your visitors and customers. In an era where digital threats are ever-evolving, embracing a proactive approach to website security is not just advisable; it's essential for preserving the integrity and trustworthiness of your online presence.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Simple Share Buttons Adder Vulnerability- Authenticated(Administrator+) Stored Cross-Site Scripting via CSS Settings – CVE-2024-0621 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment