[WordPress Security] Hiding in Plain Sight: Cross-Site Scripting Vulnerabilities Patched in Weaver Products

From: Wordfence <list_at_wordfence.com>
Date: Tue, 18 Apr 2023 07:27:09 -0700

Cross-Site Scripting Vulnerabilities would have been difficult to spot by code review, emphasizing the need for dynamic security testing

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD093kWDcV1-WJV7CgXqqW4rwnBx4NpxCbW74rjfZ7h5zyDW8f1Vbf8LkSgCW7LggDZ8HrKncN36WCqkTCC4VN4qNh47g055qW2V6-j13rX-YJW2gjx5C1tpkwnW7vv3Yp4ZpgpdW8rpDyd6WBYfMW3Npy1r8tRcqYW3_T6jN1WW2s1M3b_SVH3K6MW5c-rCy3Tx9spW7Hpn2y8W5cmMW5k7_zc4N02gB38hx1 )

Hiding In Plain Sight (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD2f3kWGhV1-WJV7Cgz_yW4ygpWV2BWvJwW5zzLm861sJSFW4RXQlk5BKsfvW1XvTB_4Mc7-rW6DtzR_9fzsqtW2YBGl_2_hXSFW2Sky9T7XWRQPN8xYK9trHBXnW3qCpPW8tXtF_W5kfSsp3fSgt6W9hF5K97MLXngW2Fq-HN6q3X1KW8kS8DN96vBxrW8VdWJz31ZV02W2GPLZd4Z3tsyVc1MLR5xX48yW8sbDW-30-DnZW8L-rcG6RcPCSW9jpJKc6s2rDBW58Dgdc8lJdpTW8JjzNl4WXK4vW57bDqz1mGh-4W33x4MB7Q3ysDN3nz1Jcw6wWPW4MR-FL7LDQxCW3zxz0q2kbR6CV-HRyd6ZjVc3W37Cmm_7nkDSgVDpCBr4kyzPdW7tpd_861QRTn32-11 )

On March 14, 2023, the Wordfence Threat Intelligence team initiated the responsible disclosure process for 2 nearly identical Cross-Site Scripting vulnerabilities in the Weaver Xtreme theme and the Weaver Show Posts plugin, which each have over 10,000 installations. The plugin developer responded the same day and we provided full disclosure.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgWvKW3H_J3Y5DqJgQW7bHv_J6wr_cNW249fG44Ycdn1TdnG_2rFYhTW3MrMWY1zWdV8Vt5gdl2c-R6rN2xp7hjDFdd7W1KsW331Rvdt1W6H-3Ls7GXj9cV8PNbK4B9R-5Vn7r6n35Sh8dW2ZkK4v6P6TmCW3ymJXd6rn_P2W4zzTDb8dx4bQMvqkDGdMhDDV2jjxK90tmSXN7dbTN191DCqW6QXzkP3SnzGwW32ky7H3P0SkpW2CQJ4M4DZc7d2hS1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgVc-N4dnXx1RkgLpW2xCsh_1BdWD4W8rczR11Dv1QJN5M2rVBX2gpVW5n7gkd2-T0TkVMDvBz34smHgVXvZ712Vk5HcVf4kR87wDfpVW4WpLnf50yVrTW7H0SDk7HMDbXW5TmpHP8d6rgCW8hxcc65MB751W5z5c1V1LMVGvW8jFBJZ5YsvF2W26Zg9N8MF2K7W92zw295yTKTlW8mQKRP50ZFHlMt_t4BFrlRgW3Q-fV588nS78W3R4g1_8QJzzj34FP1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgF12W4HgRLt5Vms9tW5DxdWN4_-GkHW8FTrJ17lnv5NW44WDfl1sWTw1W3BfbKZ5lbw_vW5-8l2n60WVx8W42XmTK5fRMGVW4SJRzP4M91MmW8DM-Px562XhTW4mTY-_5Dn12pW5kvSh64MLpKvN88r49NBvCLCW1mmTZv6hyFVCW5pSc_q8g8CzvN6gRVTZsVX-2W7T1q7m6k5tp3W3JZjv73b_JHKW5MHcfV5wWWPZW9kp23326603CW5FCB2N2B_2lX3f2j1 ) users received a firewall rule to protect against any exploits targeting this vulnerability on March 14, 2023. Sites still using the free version of Wordfence received the same protection on April 13, 2023.

A patched version of the Weaver Show Posts plugin, 1.7, was released on April 1, 2023, while the patched version 6.2 of the Weaver Xtreme theme became available on April 5, 2023.

This email content has also been published on our blog (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD2f3kWGhV1-WJV7Cgz_yW4ygpWV2BWvJwW5zzLm861sJSFW4RXQlk5BKsfvW1XvTB_4Mc7-rW6DtzR_9fzsqtW2YBGl_2_hXSFW2Sky9T7XWRQPN8xYK9trHBXnW3qCpPW8tXtF_W5kfSsp3fSgt6W9hF5K97MLXngW2Fq-HN6q3X1KW8kS8DN96vBxrW8VdWJz31ZV02W2GPLZd4Z3tsyVc1MLR5xX48yW8sbDW-30-DnZW8L-rcG6RcPCSW9jpJKc6s2rDBW58Dgdc8lJdpTW8JjzNl4WXK4vW57bDqz1mGh-4W33x4MB7Q3ysDN3nz1Jcw6wWPW4MR-FL7LDQxCW3zxz0q2kbR6CV-HRyd6ZjVc3W37Cmm_7nkDSgVDpCBr4kyzPdW7tpd_861QRTn32-11 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.

Vulnerability Summary From Wordfence Intelligence

Description:Weaver Xtreme Theme <= 5.0.7 - Authenticated(Contributor+) Stored Cross-Site Scripting via Display Name (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N5js6_V3Zsc37CgY3_VLVS2B7Qg1HpW8PB7Rq19lCWqW980FGk45WYVWW16TCRh61KTX9W9dhWlV5JbwSlW7DDjTz9h9fwzW73d-QL4GHP0QW7_whjh22d8HdW7_Khfv5hTFcgW72kp4_7tdSmrW4ZxthV459q1fN6SBgghJGmywW3m-zG44HV3kmN8L73R3lF5rwW3bJ5KD4rxB_hW1td0HN3hL9XfW3v2VgS403BrLW9fhSbm503ylPN3TrZXtPfxd6W8MK0h_9h3bHBW1LpwWL7rFkz-N4NCB2kn-3cHW75517B6wxTfyW5vlVV56-BYtNVyhRDZ50XJplW3Xh1z_2QJnbyW7CcVsN3C1SywN1Fzd1wkCT8dW9jsKLn4c9txGVlrz39531RfHW1xT5t46qPTwQW2WbwTM1-kvJpDP4XBp-Gs5W9ctD801WPwj0W4mx7S16ClfNCW63qPfY1t0-ny3p2g1 )

Affected Theme: Weaver Xtreme (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgCxkW7n7ZbB1b75v4W6XkrMS85Rcj1W344n-51XnNfwW4fQ7783nlfcyW2YNqsw5P_dVwW5wmxWn40y3t-W4mHd8w7Hs1tCW1VwgqL6nJ69GW6NYb3Z5DFN21VJ8Dg-15W0bGW5b2LnK1fQ35tW8yDbD692cZBYN8MgyPR-_--DW6_vZnT3b2D7gW3yyW-b1ZF-7vW4YgLDJ88FxH8W83P9zg20-wMBW7Rwrt441X37NW2hM-zR2q48N7W7ngP2w8W9BKN3byl1 )

Theme Slug: weaver-xtreme

Affected Versions: <= 5.0.7

CVE ID: CVE-2023-1403 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgH6CVLJP-Q260sC9VDyn1b102JqGW6MTX-x8CLn2HW7GL9dS1RnnMLW87dJD36s4GPvVT0CRj4YJdklW67zzQB1FQTj6W7Jptb42sR394W5_M9Vn43xwyFW2-8WST8SwYSFN4Qstf-LkDXKW6CjFb17sMcTmW3V_Xxk34BFplW4KCQLV8_DxrbW8FDK2_8Wg6gWW5fh56m4p1jXSMWM0Qxw8hdxW83cvyD87k2NvW6mgBx921hj2_W5q8Xzh31bfQv3fDy1 )

CVSS Score: 6.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD1m3kWFpV1-WJV7CgDFJW4f59r16jQJD0W4HgpQM5_rs_FW1vq2m74XbqP8W5x215R60n7_5W2SrDnM5xXHh4N4RWXslp_wT1W6zDpf92bf4HyW63jxJ-2VJwrvW5nhYLn1QKbjTW8S9Mbx7N-9kdW8RtR0J1KTWjSW945Nxq3KQjWYVb2Mbj5BfTdgW458tWS1wQxQlW90841X5n3NV_W3HbBG-6vv7K8W85lXg680Z-4rW7q9Nkh8npxTCN1XHLkgs3d9hW4rWb-R5HhkKtW4SL2DZ4yy3TlW8650l_21vXPCW4tJw_76Mk-gCW2bqs8G7WdjW83bYc1 )

Researcher/s: Ramuel Gall (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD1m3kWFpV1-WJV7CgDm5W3PDfdk1v2kfxW47jCZB5w4vBmW7mYRRx4DMpKwW1s7VkR402fdbW105Jhv7p8vVqW2b3Mrp22KhRqW6ZD4nb9khGfNVG1bWT4z5b3-W6_JT-c1GSCD3W2RdLT86FkC0lW84cQ4w8Tvsn1W8pvxZj47cYRcW4qtQyP8gVyKDW44LV_h4lyQ_1W493BZy5BVQfyW7MTFd26h3fPvW8FBKsD4f490TW2MMfft2btfn3W3S7--61lLb2GVK4WN_2KzLrnM_hDVHzzl0XW1xYXyG3wvsrRW51jRsX88qrwMW6rpsv08jdrbR3nqT1 )

Fully Patched Version: 6.2

The Weaver Xtreme theme for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 5.0.7. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Description: Weaver Show Posts <= 1.6 - Authenticated(Contributor+) Stored Cross-Site Scripting via Display Name (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N5js6_V3Zsc37CgT1FW2lQzKG1kX74JN2PqRYfZBRvhW2WqGTT5MCSTwN4f0D_Bpv4LmVvp837169VWCN6RZ2S2BZ4c2N1p8l30zd-vtW3LHKLC6mbt9gVFPjNy9j-NVzW7C0qJC6tdx9lW8kMKby2zFkgZW7l23095Z80F8W2sKRf28zS0TkW8Md4Vl8fmKHzVh2nYz7bD4ShW5CJ5hz5V1w-FW9dG_hW2DwZ7rW8ytD4K4-Gk5YW1Gyz2D3d1ccqN1qbXdclNxNhW7LJT9Y7SMvlJW3dPHGt6nkCT9W4pCzPW5r1byfW7CKqtd7YQN4NW4DDZkV70rdpzW2t1Tns3_RY3xW66m49f8HTbxkW2T6FVV6z0dfTW8YhTT16KNlGXF5658_CH645W54LJG75s2rpHW26Bz4s4Xqs81W5_QJ6y1lPRJGW2f9XFg1y2pbCW90x_5l4CsmClW1XQrGS43RRH2380X1 )

Affected Plugin: Weaver Show Posts (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgFvZW7Q7PFN7VYtzpN770btkDT97cW6tHJ1K5FvNGlVjTvMc8jFnM5N17fNNjN0xMkW4Rkn8_3m8FW0VL7wyC6gLG3SW12VhW_8YbWKWW6FHLyF5vX0NSW4n_nnM9bPFfbW6Q3Xq61dpYQnW6F3DPp4l_sdkW5CxHgg1vPRLWVb9dLk2td8nVW6Wspwr22L1ZmW5x45jp1ZZDn8Vnq2Hl9bmKDpW29hZ0s2GLYvVV8cjhz2syBfQW2HW-qL19b3Yt3fkV1 )

Plugin Slug: show-posts

Affected Versions: <= 1.6

CVE ID: CVE-2023-1404 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgHKmW4sw01-8sM6rnW5pw-9B1SGZlHW8zlZ__7ym3QcW2VBD654JPY4_W6grH9R44vv7rW2k4Jc96mc-65W8ck21d1zwzLZW9hP-Kp4L9dv4W6m2yhG5xj61BW1rFksy7FGjDtW353fKn8mCFSnW5FmQR91jJKSGW6Vc-hP5r55yFVJKLwY7XMHgHW2cxLZh3K9v_jW8zJxqc6YLB3mW1xm4tQ8F5P-BW7J-YRD3TbWJGW9cpSvc8LXYk-W55cS7b8CP8Ng3l2K1 )

CVSS Score: 6.4 (Medium)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD1m3kWFpV1-WJV7CgDFJW4f59r16jQJD0W4HgpQM5_rs_FW1vq2m74XbqP8W5x215R60n7_5W2SrDnM5xXHh4N4RWXslp_wT1W6zDpf92bf4HyW63jxJ-2VJwrvW5nhYLn1QKbjTW8S9Mbx7N-9kdW8RtR0J1KTWjSW945Nxq3KQjWYVb2Mbj5BfTdgW458tWS1wQxQlW90841X5n3NV_W3HbBG-6vv7K8W85lXg680Z-4rW7q9Nkh8npxTCN1XHLkgs3d9hW4rWb-R5HhkKtW4SL2DZ4yy3TlW8650l_21vXPCW4tJw_76Mk-gCW2bqs8G7WdjW83bYc1 )

Researcher/s: Alex Thomas (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD1m3kWFpV1-WJV7CgQqGVdyfMq16dmZzW5F3phc5lVpjnW7d4G3c7nQNCcW94LmTG1Wp5x0W41-h1N3GRdlnW7Xgtcw6_tWH3W4ySJsl5HsZ7YN1mcJ7Z7Wqk_W8YB2f97k0vWfW4Lfj1w88xYj8W7C4ThM2hyj1hW7fVJ974XsmjFW1ThcM167PJgRW1TTlYQ8-C0f1W5Tc3ZG8Dpg9YW1qKJKg8NBD0WW5BMl904Q0gxxW1vh6x223hqjjW40Y-Cn5pV2zzW7KB6KC5WxllpW5L90yR4tKNChW6QPmbm7mchyrN6PDcqzDNsplN6S3-nY-DRWd31zv1 )

Fully Patched Version: 1.7

The Weaver Show Posts plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Vulnerability Analysis

Both the Weaver Xtreme theme and the Weaver Show Posts plugin contain author attribution functionality that can be used by site visitors to view all posts by a given author. Although the function in question used escaping to prevent Cross-Site Scripting, the order of the functions used meant that the author name was not actually escaped upon output:

sprintf (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD2f3kWGhV1-WJV7Cgz_yW4ygpWV2BWvJwW5zzLm861sJSFW4RXQlk5BKsfvW1XvTB_4Mc7-rW6DtzR_9fzsqtW2YBGl_2_hXSFW2Sky9T7XWRQPN8xYK9trHBXnW3qCpPW8tXtF_W5kfSsp3fSgt6W9hF5K97MLXngW2Fq-HN6q3X1KW8kS8DN96vBxrW8VdWJz31ZV02W2GPLZd4Z3tsyVc1MLR5xX48yW8sbDW-30-DnZW8L-rcG6RcPCSW9jpJKc6s2rDBW58Dgdc8lJdpTW8JjzNl4WXK4vW57bDqz1mGh-4W33x4MB7Q3ysDN3nz1Jcw6wWPW4MR-FL7LDQxCW3zxz0q2kbR6CV-HRyd6ZjVc3W37Cmm_7nkDSgVDpCBr4kyzPdW7tpd_861QRTn32-11 )

This is the sort of mistake that would be very difficult to spot via a manual code review - it looks correct and was almost certainly intended to prevent exactly the sort of issue we found. We only spotted it because one of the author names on our test platform was prepopulated with a Cross-Site Scripting payload, which fired when testing an unrelated issue.

The reason this is vulnerable is that the esc_attr function runs before the sprintf function populates the unescaped output of the get_the_author function.

The patched version simply escapes the output of get_the_author and then wraps the entire block in wp_kses_post for good measure:

fixed (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD2f3kWGhV1-WJV7Cgz_yW4ygpWV2BWvJwW5zzLm861sJSFW4RXQlk5BKsfvW1XvTB_4Mc7-rW6DtzR_9fzsqtW2YBGl_2_hXSFW2Sky9T7XWRQPN8xYK9trHBXnW3qCpPW8tXtF_W5kfSsp3fSgt6W9hF5K97MLXngW2Fq-HN6q3X1KW8kS8DN96vBxrW8VdWJz31ZV02W2GPLZd4Z3tsyVc1MLR5xX48yW8sbDW-30-DnZW8L-rcG6RcPCSW9jpJKc6s2rDBW58Dgdc8lJdpTW8JjzNl4WXK4vW57bDqz1mGh-4W33x4MB7Q3ysDN3nz1Jcw6wWPW4MR-FL7LDQxCW3zxz0q2kbR6CV-HRyd6ZjVc3W37Cmm_7nkDSgVDpCBr4kyzPdW7tpd_861QRTn32-11 )

This type of vulnerability emphasizes the need for dynamic security testing in addition to code review, as vulnerabilities are often hiding in plain sight.

While this type of vulnerability does require a trusted (contributor+) attacker in most configurations to exploit, Cross-Site Scripting can be used to take over a website, for instance, if an administrator views or previews a post by a contributor with malicious JavaScript hidden in their author name.

On sites that use contributors, it is required for administrators or editors to review posts by contributors in order to publish them, so this is a genuine risk for sites that make use of this functionality.

Disclosure Timeline

March 14, 2023 - Two members of our Threat Intelligence team, Ramuel Gall and Alex Thomas, find similar issues in the Weaver Xtreme theme and Weaver Show Posts plugin. Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgWvKW3H_J3Y5DqJgQW7bHv_J6wr_cNW249fG44Ycdn1TdnG_2rFYhTW3MrMWY1zWdV8Vt5gdl2c-R6rN2xp7hjDFdd7W1KsW331Rvdt1W6H-3Ls7GXj9cV8PNbK4B9R-5Vn7r6n35Sh8dW2ZkK4v6P6TmCW3ymJXd6rn_P2W4zzTDb8dx4bQMvqkDGdMhDDV2jjxK90tmSXN7dbTN191DCqW6QXzkP3SnzGwW32ky7H3P0SkpW2CQJ4M4DZc7d2hS1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgVc-N4dnXx1RkgLpW2xCsh_1BdWD4W8rczR11Dv1QJN5M2rVBX2gpVW5n7gkd2-T0TkVMDvBz34smHgVXvZ712Vk5HcVf4kR87wDfpVW4WpLnf50yVrTW7H0SDk7HMDbXW5TmpHP8d6rgCW8hxcc65MB751W5z5c1V1LMVGvW8jFBJZ5YsvF2W26Zg9N8MF2K7W92zw295yTKTlW8mQKRP50ZFHlMt_t4BFrlRgW3Q-fV588nS78W3R4g1_8QJzzj34FP1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgF12W4HgRLt5Vms9tW5DxdWN4_-GkHW8FTrJ17lnv5NW44WDfl1sWTw1W3BfbKZ5lbw_vW5-8l2n60WVx8W42XmTK5fRMGVW4SJRzP4M91MmW8DM-Px562XhTW4mTY-_5Dn12pW5kvSh64MLpKvN88r49NBvCLCW1mmTZv6hyFVCW5pSc_q8g8CzvN6gRVTZsVX-2W7T1q7m6k5tp3W3JZjv73b_JHKW5MHcfV5wWWPZW9kp23326603CW5FCB2N2B_2lX3f2j1 ) users receive a firewall rule to provide protection against any exploits that may target this vulnerability. We responsibly disclose the plugin to the developer, who responds quickly.

April 1, 2023 - The Weaver Show Posts plugin receives a patch in version 1.7.

April 5, 2023 - The Weaver Xtreme theme receives a patch in version 6.2.

April 13, 2023 - The firewall rule becomes available to all Wordfence users.

Conclusion

In today’s post, we detailed two flaws in the Weaver Xtreme theme and Weaver Show Posts plugin that enabled authenticated attackers, with at least contributor-level access to a site, to inject JavaScript via their display name which could ultimately lead to complete site compromise. This flaw has been fully patched in version 1.7 of Weaver Show Posts and 6.2 of Weaver Xtreme. We recommend that WordPress users immediately verify that their site has been updated to the latest patched versions available.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgWvKW3H_J3Y5DqJgQW7bHv_J6wr_cNW249fG44Ycdn1TdnG_2rFYhTW3MrMWY1zWdV8Vt5gdl2c-R6rN2xp7hjDFdd7W1KsW331Rvdt1W6H-3Ls7GXj9cV8PNbK4B9R-5Vn7r6n35Sh8dW2ZkK4v6P6TmCW3ymJXd6rn_P2W4zzTDb8dx4bQMvqkDGdMhDDV2jjxK90tmSXN7dbTN191DCqW6QXzkP3SnzGwW32ky7H3P0SkpW2CQJ4M4DZc7d2hS1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgVc-N4dnXx1RkgLpW2xCsh_1BdWD4W8rczR11Dv1QJN5M2rVBX2gpVW5n7gkd2-T0TkVMDvBz34smHgVXvZ712Vk5HcVf4kR87wDfpVW4WpLnf50yVrTW7H0SDk7HMDbXW5TmpHP8d6rgCW8hxcc65MB751W5z5c1V1LMVGvW8jFBJZ5YsvF2W26Zg9N8MF2K7W92zw295yTKTlW8mQKRP50ZFHlMt_t4BFrlRgW3Q-fV588nS78W3R4g1_8QJzzj34FP1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgF12W4HgRLt5Vms9tW5DxdWN4_-GkHW8FTrJ17lnv5NW44WDfl1sWTw1W3BfbKZ5lbw_vW5-8l2n60WVx8W42XmTK5fRMGVW4SJRzP4M91MmW8DM-Px562XhTW4mTY-_5Dn12pW5kvSh64MLpKvN88r49NBvCLCW1mmTZv6hyFVCW5pSc_q8g8CzvN6gRVTZsVX-2W7T1q7m6k5tp3W3JZjv73b_JHKW5MHcfV5wWWPZW9kp23326603CW5FCB2N2B_2lX3f2j1 ) users received a firewall rule to protect against any exploits targeting this vulnerability on March 14, 2023. Sites still using the free version of Wordfence received the same protection on April 13, 2023.

If you know a friend or colleague who is using the Weaver Xtreme theme or Weaver Show Posts plugin on their site, we highly recommend forwarding this advisory to them to help keep their sites protected.

If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0t3kWDwV1-WJV7CgPF6W2BmkHH7bXd7mW2tBKBq5WMYbRN3PlrbKL1FCJW770NjV6-2qzqMW5xg-r57dnW827Hbp5C-WkYVk1Kph3cDzJmN2kFPSPPztX5VxtfWx1Dc9ZsW9j412B2Y6x17W5Ct7c_5CQyMCW8Ccg2v7yZpRpN5rCWs0ry9VnW3phNcs1jJnTpN89dVz2dP43ZVSXWny91P0yYW3GhXN_9gSjlTW61_P34720mgz34v_1 ) and get your name on the Wordfence Intelligence leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD133kWF5V1-WJV7CgDWDW5BF5LM5VpXbNW1sBM1N4KcMRxW44R3B34vtpm4W3-jQb85vTvhxN118gHlDlfp3N3W-GTWHxC6lW5JmqpJ8XC_k1VXlh769079w2W2jYb2q11wYQkW2_vJhS8MHQHdW4sHp4V4D9gNrN27322jfdPY8W8n4wjr5Dq0VcW4MwgGn1gJRjlN8yQBbB1c9TqN7lSGQdYsnt4W4yym5H9cTZyXVkJM-g5bfsQgW8mN6Mg1mNzkpW2fnx5_7Hb6y2N4zfHp6KhNWpW3v8yBv6DZrVc38p71 ) .

Special thanks to Senior Web Application Vulnerability Researcher Alex Thomas for finding the second vulnerability in the Weaver Show Posts plugin shortly after the initial discovery of the Weaver Xtreme theme vulnerability.

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgHPnW42m-nK2Hvm9kF5-D0-2HFv4W9gMlB65V_P1WW39sGf22DBkqnN5TbgxMNx5zCW4XSTQ625t7lrW5nW-xm95ZMXTW69HzQg6yFmVKN5zyFXhbnl8pW1NvpK97yRfRsW75WS2v8_1w0tW5DTxdG77_rd5W6T-_Gq43pbwbW8RSyYW36q5nsW4sc3XW6x8XvtW3T2Tm13cf_hvW2ftTGF2457YbW86f91P7nfr9jV434v36fbWqzW41PvN07rQVPS3fPw1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgQ-RW273LGZ51m5V4W2jygL_3PnBJ_W4CPHtX4bNWRNW2JKPMY6-ych2N1ClrcNWxwpWW5dgDjf67KvSmW9js3CX8FXGhLW1CkYfx8sQJ7dW6VrZFn63f_hrN1MH02g7kx0dW85RDHP3L77GfW5Cv0GG5KFhZ9W1wZxQF6syJgBW2gnqlT39mzCrW7qT8237x0S8JW9fjH2J7VqvsnVf0-Ds77JhCqW1rGRS2315vPzV6b8Lh5KS6vTN8-x6nJCCWzR2bs1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgKDHW5gH-qd64Y_4yW43jNwB6520tMW2Jx8M33cnxR5W7z1YmG6DMqMWW5BgDyv7dKnj1VgwZNW6J1hl3VykFlM6jVr3YW3JM51f3p4F7wVw-SYV6KZ7lSW13WBDZ6k3K0XW8TJP-D6Nq41QW8WWSj_1ZzmS7W5Czd9K4BdvnyW6c2VS52cQGwQW4V13m-1Rq_G3W3ZY-hb3cFm-WW64wym11-b9rFW6V7XYf66Tgv9N3xYbkVw8FKtW98JqJw5t_vwZ3pKz1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0N3kWDQV1-WJV7CgF12W4HgRLt5Vms9tW5DxdWN4_-GkHW8FTrJ17lnv5NW44WDfl1sWTw1W3BfbKZ5lbw_vW5-8l2n60WVx8W42XmTK5fRMGVW4SJRzP4M91MmW8DM-Px562XhTW4mTY-_5Dn12pW5kvSh64MLpKvN88r49NBvCLCW1mmTZv6hyFVCW5pSc_q8g8CzvN6gRVTZsVX-2W7T1q7m6k5tp3W3JZjv73b_JHKW5MHcfV5wWWPZW9kp23326603CW5FCB2N2B_2lX3f2j1 )

wf-logo-intelligence-h-800 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD0t3kWDwV1-WJV7CgR_rW7mm0yw45w_bSW9jk5t97jH2_3W31n4vd1YMfnkW4Wm7177sc-D0W49vGfg7DxRqsW7lypZ-4RbB2fW76cmCW1lPvh7W2TmlwS8VBHnLW38lQ_97DSDk8W1ndVQC7Snkv7W7l1pJd3YMVG7W4VLbv-4mP6bCW1JBg_p1BP1CRW4n2YTK668ZkjW8xb3gr68-nRMW3vtb2C8d7FZFW3JDLmb1mPqpsN231vlBNNNDr3f8B1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDZWh5hXH8zVxJ4G62xdzV1W1-ywb14ZwF-qN7FnD093kWDcV1-WJV7CgCNvW3f6mGL1xjMpzW7wK7b78d3G3tW4gGF8m3zm7hxW8sh2qL8FWp_3N5Pl_Wv9PmFkW7gdjCS45LHDjW1clrNT56QFS-W6j925Y62LwRxW2bky5x4c4bG6W6VKkvv3dK7YTW1PBft-7TPxtXW4ts0rr2wKg_GW2nHFdZ6fMky-W1yDZ-L75v4RhW6Xtqvs2D0qMqW5MZ_P298Q5zs3mGK1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNnW4Y2d1v4_XqB0V25rD26vP9BnW7lgpl87GBTVcN95H2L71yf0NW307PJZ8vgZ8jW1TYnVC8bVBjvf8V2Bh8W3&v=3&_hsenc=p2ANqtz-9ctT4tdnN_j1ajLVLvshswBnaubxGPd5O-HR-Gm5z78IXvyvwFUX1vKw_b4wQw1MYU3qadOueer0-lvd8sc8GgoGvWGw&_hsmi=254760911 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNnW4Y2d1v4_XqB0V25rD26vP9BnW7lgpl87GBTVcN95H2L71yf0NW307PJZ8vgZ8jW1TYnVC8bVBjvf8V2Bh8W3&v=3&_hsenc=p2ANqtz-9ctT4tdnN_j1ajLVLvshswBnaubxGPd5O-HR-Gm5z78IXvyvwFUX1vKw_b4wQw1MYU3qadOueer0-lvd8sc8GgoGvWGw&_hsmi=254760911 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Apr 18 2023 - 16:27:11 CEST

This archive was generated by hypermail 2.3.0 : Tue Apr 18 2023 - 16:32:47 CEST