Sploit.io - Search

Product: YaDisk Files, version: <= 1.2.5

CVE-2024-10709

Severity: MEDIUM

Description: The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110130000
  • Date: 2025-01-03

ExploitDB

No data available.

HackerOne Data

  • Rank: 7431
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Unknown YaDisk Files - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-10709 is a Stored Cross-Site Scripting (XSS) issue in the YaDisk Files WordPress plugin, affecting versions up to and including 1.2.5. This vulnerability arises due to insufficient validation and escaping of shortcode attributes, allowing malicious scripts to be embedded in pages or posts. Users with contributor-level access or higher can exploit this flaw to inject arbitrary JavaScript, which executes in the context of other users who view the compromised content.

    The likelihood of exploitation is moderate, as it requires an authenticated user with contributor privileges or higher. However, the ease of exploitation is high, as the attack vector is straightforward and does not require advanced technical skills. The potential impacts are significant:
    - **Confidentiality**: Attackers could steal sensitive information, such as session cookies or user credentials, by executing malicious scripts in the victim's browser.
    - **Integrity**: Malicious scripts could alter website content, deface pages, or manipulate user interactions, leading to reputational damage.
    - **Availability**: While the vulnerability does not directly cause denial of service, it could be leveraged to disrupt user experience or redirect users to malicious sites.

    The EPSS score of 0.000430000 indicates a low probability of active exploitation in the wild, but the CVSSv3.1 base score of 6.8 (Medium severity) underscores the potential for significant harm if exploited.

    2. Potential Attack Scenarios
    A potential attack scenario involves an authenticated contributor with malicious intent exploiting the vulnerability to perform a Stored XSS attack. The attacker logs into the WordPress dashboard with contributor-level access and creates or edits a post, embedding a malicious shortcode with unvalidated attributes. For example, the attacker could inject a script that captures session cookies or redirects users to a phishing site.

    When an administrator or another user views the compromised post, the malicious script executes in their browser. This could lead to the theft of sensitive information, such as administrative credentials, or the injection of additional malicious content into the website. The attacker could escalate privileges, gain full control of the WordPress site, or use the compromised site to launch further attacks against visitors.

    3. Mitigation Recommendations
    To mitigate this vulnerability, immediate action is required:
    - **Patch the Plugin**: Update the YaDisk Files plugin to a version beyond 1.2.5 if a patch is available. If no patch is available, consider disabling or removing the plugin until a fix is released.
    - **Input Validation and Output Escaping**: Ensure all shortcode attributes are properly validated and escaped before being rendered on the front end. This can be achieved by modifying the plugin code or using a security plugin that enforces these practices.
    - **Role-Based Access Control**: Restrict contributor-level access to trusted users only. Regularly review user roles and permissions to minimize the attack surface.
    - **Web Application Firewall (WAF)**: Deploy a WAF to detect and block XSS payloads. Many WAF solutions can be configured to filter malicious scripts before they reach the application.
    - **Security Audits**: Conduct regular security audits of WordPress plugins and themes to identify and address vulnerabilities proactively.

    For further guidance, refer to the WPScan vulnerability report: https://wpscan.com/vulnerability/114aeaf7-32a5-4510-a497-92cc0951b022/.

    4. Executive Summary
    CVE-2024-10709 is a Stored Cross-Site Scripting (XSS) vulnerability in the YaDisk Files WordPress plugin, affecting versions up to 1.2.5. This flaw allows authenticated users with contributor-level access or higher to inject malicious scripts into posts or pages, which execute when viewed by other users. The vulnerability poses a moderate risk to confidentiality, integrity, and availability, with potential impacts including data theft, website defacement, and reputational damage.

    While the likelihood of exploitation is moderate, the ease of exploitation is high, making it a critical issue to address. Immediate mitigation steps include updating the plugin, implementing input validation and output escaping, and restricting access to trusted users. Failure to address this vulnerability could result in significant harm to the organization's digital assets and reputation. Prompt action is strongly recommended to safeguard the website and its users.

    CVE-2024-10710

    Severity: LOW

    Description: The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

    CVSS Score: N/A

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.000430000
    • Percentile: 0.110130000
    • Date: 2025-01-03

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 7431
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Unknown YaDisk Files - Versions: 0

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability identified as CVE-2024-10710 affects the YaDisk Files WordPress plugin versions 1.2.5 and earlier. It is a Stored Cross-Site Scripting (XSS) vulnerability that arises due to insufficient sanitization and escaping of certain plugin settings. This flaw allows high-privilege users, such as administrators, to inject malicious scripts into the application, which are then executed when other users access the affected pages.

      - **Likelihood of Exploitation**: The likelihood of exploitation is moderate. While the vulnerability requires high privileges (admin access) to exploit, it is still a concern in environments where multiple users have administrative access, such as multisite WordPress setups.
      - **Ease of Exploitation**: The exploitation process is relatively straightforward for an attacker with administrative access, as it involves injecting malicious scripts into the plugin settings.
      - **Impact on Confidentiality**: Low to moderate. Attackers could potentially steal sensitive information from users who interact with the compromised pages.
      - **Impact on Integrity**: Moderate. The vulnerability allows attackers to manipulate content on the website, potentially leading to defacement or the injection of malicious content.
      - **Impact on Availability**: Low. The vulnerability does not directly affect the availability of the system, but the injected scripts could disrupt user experience.

      2. Potential Attack Scenarios
      **Scenario 1: Malicious Admin Exploits Stored XSS**
      - **Attack Vector**: An attacker with administrative privileges in a WordPress multisite setup exploits the vulnerability by injecting a malicious script into the YaDisk Files plugin settings.
      - **Attack Process**:
      1. The attacker logs into the WordPress admin dashboard.
      2. They navigate to the YaDisk Files plugin settings and inject a malicious script into one of the unsanitized fields.
      3. The script is stored in the database and executed whenever a user accesses the affected page.
      4. The script could steal session cookies, redirect users to malicious sites, or perform actions on behalf of the user.
      - **Potential Outcomes**:
      - Sensitive user data, such as login credentials or session cookies, could be stolen.
      - The website's reputation could be damaged due to defacement or malicious content.
      - Users could be redirected to phishing sites, leading to further compromise.

      3. Mitigation Recommendations
      - **Immediate Actions**:
      1. Update the YaDisk Files plugin to the latest version if a patch is available. If no patch is available, consider disabling or removing the plugin.
      2. Review and restrict administrative access to only trusted users.
      3. Implement input validation and output escaping for all user-controllable inputs in the plugin settings.
      - **Long-Term Actions**:
      1. Regularly audit WordPress plugins for vulnerabilities and ensure they are kept up to date.
      2. Implement a Web Application Firewall (WAF) to detect and block XSS attacks.
      3. Conduct security training for administrators to recognize and avoid potential exploitation of such vulnerabilities.
      - **Relevant Resources**:
      - WPScan Vulnerability Details: https://wpscan.com/vulnerability/165ab698-c8b5-4412-a621-c5365d621fc5/
      - PacketStorm Security Search: https://packetstormsecurity.com/search/?q=CVE-2024-10710

      4. Executive Summary
      CVE-2024-10710 is a Stored Cross-Site Scripting (XSS) vulnerability in the YaDisk Files WordPress plugin, affecting versions 1.2.5 and earlier. This vulnerability allows high-privilege users, such as administrators, to inject malicious scripts into the website, which can lead to data theft, defacement, or user redirection to malicious sites. While exploitation requires administrative access, the risk is significant in environments with multiple administrators, such as multisite WordPress setups.

      The potential business impacts include reputational damage, loss of user trust, and potential legal liabilities if sensitive data is compromised. Immediate action is recommended, including updating or disabling the plugin, restricting administrative access, and implementing additional security measures such as input validation and a Web Application Firewall. Addressing this vulnerability is critical to maintaining the security and integrity of your WordPress environment.