CVE-2024-13182

9.8 CRITICAL

📋 TL;DR

The WP Directorybox Manager WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, including administrators. This affects all WordPress sites using this plugin up to version 2.5. Attackers can gain full administrative control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • WP Directorybox Manager WordPress plugin
Versions: All versions up to and including 2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin activated. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover - attackers gain administrative access, install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Administrative account compromise leading to content manipulation, plugin/themes installation, or data exfiltration.

🟢

If Mitigated

Limited impact if strong network controls, web application firewalls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be exploited by internal threats or attackers who have breached the network perimeter.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a publicly accessible PHP file and requires minimal technical skill to exploit. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.5 (check plugin repository for latest)

Vendor Advisory: https://wordpress.org/plugins/wp-directorybox-manager/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Directorybox Manager. 4. Click 'Update Now' if update available. 5. If no update, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable vulnerable plugin file

all

Block access to the vulnerable PHP file via web server configuration

# For Apache: add to .htaccess
<Files "cs-social-login.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~ /cs-social-login\.php$ {
    deny all;
    return 403;
}

Web Application Firewall rule

all

Block requests to the vulnerable endpoint

# Example ModSecurity rule
SecRule REQUEST_URI "@contains cs-social-login.php" "id:1001,phase:1,deny,status:403,msg:'WP Directorybox Manager auth bypass attempt'"

🧯 If You Can't Patch

  • Immediately deactivate and remove the WP Directorybox Manager plugin from all WordPress installations
  • Implement network-level blocking of requests to /wp-content/plugins/wp-directorybox-manager/elements/login/cs-social-login/cs-social-login.php

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Directorybox Manager version 2.5 or earlier

Check Version:

# From WordPress root directory
grep -r "Version:" wp-content/plugins/wp-directorybox-manager/wp-directorybox-manager.php | head -1

Verify Fix Applied:

Verify plugin is either updated to version after 2.5 or completely removed from the plugins directory

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /wp-content/plugins/wp-directorybox-manager/elements/login/cs-social-login/cs-social-login.php
  • Multiple failed login attempts followed by successful admin login from new IP
  • Unusual user agent strings accessing the vulnerable endpoint

Network Indicators:

  • POST/GET requests to cs-social-login.php with authentication parameters
  • Traffic spikes to the vulnerable endpoint from suspicious IPs

SIEM Query:

source="web_access_logs" AND (uri="*cs-social-login.php*" OR uri="*/wp-directorybox-manager/*") AND status=200

🔗 References

📤 Share & Export