April 2, 2024 at 11:39AM
A high-severity XSS vulnerability in WP-Members Membership plugin, tracked as CVE-2024-1852, allows attackers to inject malicious scripts into web pages via user registration functionality. The issue arises from insufficient input sanitization and output escaping. Version 3.4.9.3 contains a patch, but users are urged to update installations promptly due to the potential for malicious actions.
Summary:
– A high-severity cross-site scripting (XSS) vulnerability in the WP-Members Membership WordPress plugin, tracked as CVE-2024-1852, allows attackers to inject malicious scripts into web pages.
– The vulnerability is caused by insufficient input sanitization and output escaping, enabling attackers to store a malicious script as the value of a user’s IP address.
– Attackers can utilize the plugin’s user registration functionality to submit a registration form with a modified X-Forwarded-For header containing a malicious payload enclosed in script tags.
– The malicious script is stored in the user’s profile and can be executed in the context of an administrator’s browser session, potentially enabling the creation of malicious user accounts and other harmful actions.
– WP-Members Membership version 3.4.9.3 provides a patch for the vulnerability, with a partial fix included in version 3.4.9.2. Users are encouraged to promptly update their installations.
– The plugin, with over 60,000 active installations, facilitates user membership management, including user registration, logins, profile management, and restrictions setting.
Let me know if you need further details or information!