Slider, Gallery, and Carousel by MetaSlider Vulnerability – Responsive WordPress Slideshows – Authenticated (Contributor+) Stored Cross-Site Scripting via metaslider Shortcode – CVE-2024-3285 | WordPress Plugin Vulnerability Report

Plugin Name: Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Slideshows

Key Information:

  • Software Type: Plugin
  • Software Slug: ml-slider
  • Software Status: Active
  • Software Author: metaslider
  • Software Downloads: 27,208,376
  • Active Installs: 600,000
  • Last Updated: April 22, 2024
  • Patched Versions: 3.70.1
  • Affected Versions: <= 3.70.0

Vulnerability Details:

  • Name: Slider, Gallery, and Carousel by MetaSlider <= 3.70.0
  • Title: Authenticated (Contributor+) Stored Cross-Site Scripting via metaslider Shortcode
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
  • CVE: CVE-2024-3285
  • CVSS Score: 6.4
  • Publicly Published: April 10, 2024
  • Researcher: Wesley
  • Description: The plugin is vulnerable to Stored Cross-Site Scripting via the 'metaslider' shortcode in all versions up to and including 3.70.0 due to insufficient input sanitization and output escaping on user-supplied attributes. This allows authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts into pages that execute whenever a user accesses an injected page.

Summary:

The Slider, Gallery, and Carousel by MetaSlider plugin for WordPress has a vulnerability in versions up to and including 3.70.0 that allows authenticated attackers to inject arbitrary web scripts via the 'metaslider' shortcode. This vulnerability has been patched in version 3.70.1.

Detailed Overview:

This vulnerability was identified by researcher Wesley and involves the misuse of the 'metaslider' shortcode within the plugin. Due to insufficient input sanitization and output escaping, attackers with at least contributor-level access can embed malicious scripts in the shortcode attributes. These scripts can then execute on the client side, leading to potential data theft, session hijacking, and other malicious activities if the script is viewed by other users. The risk is particularly significant given the plugin's wide usage, as it directly impacts the integrity of the content displayed via the slideshows.

Advice for Users:

  • Immediate Action: Users should update to the patched version 3.70.1 immediately to mitigate the risk.
  • Check for Signs of Vulnerability: Review the pages where the MetaSlider shortcode has been used for unexpected or strange behavior and audit logs for unauthorized shortcode modifications.
  • Alternate Plugins: If security concerns persist, consider using alternative slideshow plugins that have a strong track record of security and updates.
  • Stay Updated: Always ensure that your plugins are updated to the latest versions to minimize the risk of vulnerabilities.

Conclusion:

The swift action taken by MetaSlider's developers to address and patch this vulnerability illustrates the critical nature of regular software updates in maintaining site security. Users are strongly advised to upgrade to version 3.70.1 or later of the Slider, Gallery, and Carousel by MetaSlider plugin to ensure their WordPress installations remain secure against such types of attacks.

References:

Detailed Report: 

In the vast and evolving landscape of website management, ensuring the security of your WordPress site remains a cornerstone of maintaining trust and functionality. A stark reminder of this necessity has surfaced with the recent discovery of a significant security vulnerability in the popular Slider, Gallery, and Carousel by MetaSlider plugin. This plugin, which powers dynamic visual content on over 600,000 websites, has been compromised in a way that could potentially put countless websites at risk.

Previous Vulnerabilities:

Since August 1, 2014, there have been seven reported vulnerabilities in the MetaSlider plugin. This history of issues highlights the importance of remaining vigilant and proactive in updating plugins to safeguard your website.

Conclusion:

The swift action taken by the developers of the MetaSlider plugin to address and patch this vulnerability underscores the critical nature of regular software updates in maintaining site security. For small business owners, understanding and implementing these updates are essential to protect your digital assets.

Final Thoughts:

For small business owners, particularly those with limited time and resources, it's vital to adopt a proactive stance on web security. Automating updates where possible, utilizing trusted security plugins, and conducting regular site audits can streamline the maintenance process. Keeping abreast of new vulnerabilities and updates can significantly mitigate risks and help maintain a secure and robust online presence.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Slider, Gallery, and Carousel by MetaSlider Vulnerability – Responsive WordPress Slideshows – Authenticated (Contributor+) Stored Cross-Site Scripting via metaslider Shortcode – CVE-2024-3285 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment