Critical Cross-Site Scripting Vulnerability Detected in WordPress WP-Members Membership Plugin
Security researchers from Defiant’s Wordfence research team have uncovered a critical cross-site scripting (XXS) vulnerability within the widely-used WordPress WP-Members Membership plugin. This vulnerability, if exploited, could facilitate malicious script injection, posing a significant threat to over 60,000 WordPress websites currently utilizing the plugin.
Reported to Wordfence by WordPress developer Webbernaut as part of the company’s Bug Bounty Extravaganza, the unauthenticated stored cross-site scripting vulnerability allows threat actors to inject arbitrary JavaScript through the X-Forwarded-For header utilized by the plugin for logging purposes. When viewed by an administrator, the injected code executes within the administrator’s browser session, potentially leading to the creation of malicious administrator users and unauthorized changes to the affected site’s settings, culminating in a complete site takeover.
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
The flaw affects all versions of the WP-Members Membership plugin up to and including 3.4.9.2, stemming from insufficient input sanitization and output escaping. Despite a partial patch in version 3.4.9.2, the vulnerability remains fully exploitable until version 3.4.9.3, which provides comprehensive mitigation measures.
Exploitation
Exploiting this XSS vulnerability entails intercepting a registration request, modifying it to include a malicious payload enclosed in script tags within the X-Forwarded-For header, and submitting it via a proxy. Consequently, the injected script executes whenever a user accesses the manipulated page, facilitating the creation of user accounts with attacker-provided details.
Trending: Understanding PTaaS and SOC
Trending: Offensive Security Tool: WAF Bypass