Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6155: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks

0
Medium
VulnerabilityCVE-2024-6155cvecve-2024-6155cwe-862
Published: Thu Jan 09 2025 (01/09/2025, 11:11:05 UTC)
Source: CVE Database V5
Vendor/Project: wpsoul
Product: Greenshift – animation and page builder blocks

Description

CVE-2024-6155 is a medium severity vulnerability in the Greenshift – animation and page builder blocks WordPress plugin affecting all versions up to 9. 0. 0. It allows authenticated users with Subscriber-level access or higher to perform Server-Side Request Forgery (SSRF) and Stored Cross-Site Scripting (XSS) attacks due to missing authorization checks and inadequate sanitization of uploaded SVG files. Attackers can make arbitrary web requests from the server and upload malicious SVGs containing XSS payloads. This can lead to unauthorized data access, including cloud instance metadata on cloud-hosted servers. The vulnerability was partially fixed in version 8. 9. 9 and fully patched in 9. 0.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:03:22 UTC

Technical Analysis

CVE-2024-6155 is a vulnerability in the Greenshift – animation and page builder blocks WordPress plugin, identified as CWE-862 (Missing Authorization). The flaw exists in the function greenshift_download_file_localy, which lacks proper capability checks, allowing authenticated users with Subscriber-level privileges or higher to invoke it. This results in Server-Side Request Forgery (SSRF), enabling attackers to make arbitrary HTTP requests from the server to internal or external resources. Additionally, the plugin does not properly sanitize uploaded SVG files, permitting Stored Cross-Site Scripting (XSS) attacks via malicious SVG payloads. These combined issues allow attackers to retrieve sensitive information, such as cloud instance metadata on cloud-hosted environments, and potentially execute malicious scripts in the context of the WordPress site. The vulnerability affects all versions up to and including 9.0.0. Partial remediation was introduced in version 8.9.9, with a complete fix in 9.0.1. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, and requiring low privileges but no user interaction. The scope is changed due to potential impact beyond the vulnerable component. No known exploits in the wild have been reported to date.

Potential Impact

The vulnerability enables attackers with minimal privileges (Subscriber or higher) to perform SSRF attacks, potentially accessing internal network resources, sensitive files, or cloud metadata services, which can lead to further compromise or data leakage. The stored XSS via SVG uploads can allow persistent script execution in the context of the WordPress site, risking session hijacking, defacement, or further exploitation. Organizations using this plugin on WordPress sites face risks of unauthorized data exposure, privilege escalation, and reputational damage. Cloud-hosted environments are particularly at risk of metadata service exposure, which can lead to credential theft and lateral movement. Although availability is not directly impacted, confidentiality and integrity are at risk. The medium CVSS score reflects the balance between required authentication and the significant potential impact on sensitive data and site security.

Mitigation Recommendations

Administrators should immediately update the Greenshift plugin to version 9.0.1 or later, where the vulnerability is fully patched. Until the update is applied, restrict plugin usage to trusted users only and consider temporarily disabling the plugin if Subscriber-level users are untrusted. Implement web application firewall (WAF) rules to detect and block SSRF patterns and malicious SVG uploads. Enforce strict file upload policies, including sanitization and validation of SVG files, or disable SVG uploads if not required. Monitor server logs for unusual outbound HTTP requests originating from the WordPress server. On cloud platforms, restrict access to instance metadata services using network controls or metadata service protection features (e.g., AWS IMDSv2). Regularly audit user roles and permissions to minimize the number of users with Subscriber or higher access. Employ Content Security Policy (CSP) headers to mitigate the impact of XSS attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-18T21:57:36.542Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bfcb7ef31ef0b55d549

Added to database: 2/25/2026, 9:39:08 PM

Last enriched: 2/26/2026, 3:03:22 AM

Last updated: 2/26/2026, 6:23:32 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats