CVE-2024-11645
CVE-2024-11645 affects the float block WordPress plugin, potentially allowing Cross-Site Scripting (XSS) attacks. A high-privilege user, like an administrator, could inject malicious scripts into the plugin's settings. This vulnerability exists because the plugin doesn't properly sanitize and escape certain settings. Even with unfiltered_html capabilities disabled, this attack is still possible, especially in multisite WordPress setups. The risk includes website compromise, data theft, or malicious redirects. Although the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a low level of risk, despite being tagged as "In The Wild", meaning it's been observed being exploited. Addressing this vulnerability is important to maintain the integrity of your WordPress site and prevent unauthorized actions.
Description
CVE-2024-11645 affects the Float Block WordPress plugin versions up to 1.7. This vulnerability allows high-privilege users, such as administrators, to execute Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html
capability is disabled, potentially compromising the website and its users. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk that warrants attention and mitigation.
Key Insights
- Stored XSS: This vulnerability enables attackers to inject malicious JavaScript code into the website's database, which is then executed by unsuspecting users when they visit the affected page. This code could steal sensitive information, redirect users to malicious websites, or even take control of the website itself.
- High Privilege Users: The vulnerability exploits the privileges of high-level users, such as administrators. This means attackers could exploit the vulnerability by compromising an admin account or exploiting other vulnerabilities that grant them admin privileges.
- Multisite Setup: The vulnerability is particularly relevant in multisite setups, as it bypasses security mechanisms meant to prevent XSS attacks in such environments.
Mitigation Strategies
- Update the Plugin: Immediately update the Float Block plugin to version 1.8 or later, as this version addresses the vulnerability.
- Disable Unfiltered HTML: If possible, disable the
unfiltered_html
capability for all users who do not require it. This helps to prevent XSS attacks by limiting the ability of users to inject arbitrary HTML code into the website. - Implement a Web Application Firewall (WAF): A WAF can help to detect and block XSS attacks by analyzing incoming traffic and filtering out malicious requests.
- Regularly Scan for Vulnerabilities: Conduct regular vulnerability scans of your website to identify and remediate any potential weaknesses.
Additional Information:
If you have additional questions about this specific vulnerability or require further assistance, please use the 'Ask to Analyst' feature on SOCRadar, contact us directly, or open a support ticket for more information.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.