SEOPress WordPress Plugin Vulnerability Potentially Risked Over 100K Sites

A serious vulnerability in the SEOPress plugin posed a threat to thousands of WordPress websites. Exploiting the vulnerability could allow injecting arbitrary scripts on target websites or full site takeover.

SEOPress Plugin Vulnerability

Team Wordfence has come up with details about another vulnerable WordPress plugin. Their recent findings shared in a blog post are about an XSS vulnerability in the SEOPress WordPress plugin.

SEOPress is a dedicated plugin for managing the SEO of WordPress websites via different features.

As elaborated, a medium severity cross-site scripting (XSS) vulnerability existed in the REST-API endpoint meant for adding SEO title and description to posts. Due to improper user validation, the vulnerable endpoint allowed an authenticated adversary to make changes to the site’s posts.

Unfortunately, this REST-API endpoint was insecurely implemented. The permissions_callback for the endpoint only verified if the user had a valid REST-API nonce in the request. A valid REST-API nonce can be generated by any authenticated user using the rest-nonce WordPress core AJAX action. This meant that any authenticated user, like a subscriber, could call the REST route with a valid nonce, and update the SEO title and description for any post.

An adversary could exploit this issue to inject malicious web scripts. The scripts would execute whenever a user would access the “All Posts” page, leading to fake account creation, arbitrary redirects, and website takeover.

Patch Rolled Out

Upon discovering the bug in late July, the researchers reached out to the plugin developers to report the flaw.

Given the 100,000+ active installations of this plugin (as mentioned on the plugin page), the vulnerability potentially affected thousands of websites.

Nonetheless, following the bug report, the developers quickly patched the flaw with the release of SEOPress version 5.0.4.

Hence, now, all WordPress admins running this plugin on their websites must ensure updating their sites to the latest plugin version at the earliest.

Let us know your thoughts in the comments.

Related posts

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group

Guardz Welcomes SentinelOne as Strategic Partner and Investor to Boost Cybersecurity Defenses for SMBs