Site icon CleanTalk's blog

CVE-2023-4798 – User Avatar – Reloaded < 1.2.2 - Contributor+ Stored XSS

During the plugin’s testing phase, a vulnerability was identified that enables the execution of Stored XSS by an attacker who embeds a shortcode in a new post, potentially leading to an account takeover.

Main info:

CVECVE-2023-4798
PluginUser Avatar – Reloaded
CriticalHigh
Publicly PublishedSeptember 25, 2023
Last UpdatedSeptember 25, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitWill be later
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4798
https://wpscan.com/vulnerability/273a95bf-39fe-4ba7-bc14-9527acfd9f42
Plugin Security Certification by CleanTalk

Timeline

August 22, 2023Plugin testing and vulnerability detection in the User Avatar – Reloaded access plugin have been completed
August 22, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
September 22, 2023The author has released a fix update
September 25, 2023Registered CVE-2023-4798

Discovery of the Vulnerability

While conducting a security assessment of the User Avatar – Reloaded plugin, a critical vulnerability was identified. This vulnerability allows for the execution of Stored Cross-Site Scripting (XSS) attacks, carried out on behalf of a contributor-level user by embedding a malicious shortcode within a new post. This security flaw poses a significant threat as it enables attackers to gain control over user accounts and potentially compromise the integrity of the website.

Understanding of Stored XSS attack’s

Stored Cross-Site Scripting (XSS) is a type of security vulnerability that occurs when an application does not properly validate and sanitize user inputs. It allows an attacker to inject malicious scripts into a website, which are then stored and executed when other users view the affected content. This can lead to a range of malicious actions, including data theft, session hijacking, or even complete website compromise.

Exploiting the Stored XSS

Exploiting the Stored XSS vulnerability in the User Avatar – Reloaded plugin involves an attacker with contributor-level access inserting malicious code within a shortcode. This code can include payloads designed to steal user cookies, impersonate users, or perform actions on behalf of the compromised contributor account. Attackers can craft convincing phishing attempts, potentially leading to the compromise of sensitive data and accounts.

POC shortcode:

[avatar user=”admin” size=”96″ align=”left” link='” onmouseover=”alert(/XSS/)”‘ /]

This is shortcode which you can add to new post

The potential risks associated with CVE-2023-4798 are substantial. An attacker could compromise the accounts and privacy of contributors and potentially escalate their access to perform more malicious actions. This could include posting harmful content, stealing user data, or manipulating website functionality.

In a real-world scenario, imagine an attacker gaining access to a contributor-level account on a website using the User Avatar – Reloaded plugin. By embedding a malicious shortcode in a post, they can target and compromise the accounts of unsuspecting users who view the manipulated content. This could lead to unauthorized access, data breaches, and a loss of trust in the website’s security.

Recommendations for Improved Security

To mitigate the risk posed by CVE-2023-4798 and enhance the overall security of WordPress websites using the User Avatar – Reloaded plugin, the following recommendations should be considered:

By following these recommendations, website owners can significantly reduce the risk of Stored XSS attacks and enhance the overall security posture of their WordPress installations.

#WordPressSecurity #StoredXSS #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii i.

If you think your website is infected and you need help, contact us for malware cleanup. Our specialists will provide you with professional assistance in cleaning your website from malware.


Check my website

CVE-2023-4798 – User Avatar – Reloaded < 1.2.2 - Contributor+ Stored XSS
Exit mobile version