CVE-2024-13315

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in the Shopwarden WordPress plugin allows attackers to trick administrators into clicking malicious links that can change plugin settings and escalate privileges. All WordPress sites using Shopwarden plugin versions 1.0.11 and earlier are affected. Attackers can modify arbitrary options without authentication through forged requests.

💻 Affected Systems

Products:
  • Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress
Versions: All versions up to and including 1.0.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable Shopwarden plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, allowing complete site takeover, data theft, malware injection, and further compromise of the hosting environment.

🟠

Likely Case

Attackers modify plugin settings to disable security features, inject malicious code, or redirect users to phishing sites, potentially leading to data breaches and reputation damage.

🟢

If Mitigated

With proper CSRF protections and admin awareness, exploitation attempts fail, maintaining normal plugin functionality without security compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated administrators into clicking malicious links while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.0.12 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238978%40shopwarden&new=3238978%40shopwarden&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Shopwarden plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.0.12+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available

wp plugin deactivate shopwarden

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict script execution
  • Use WordPress security plugins with CSRF protection and monitor for suspicious admin actions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Shopwarden version. If version is 1.0.11 or earlier, you are vulnerable.

Check Version:

wp plugin get shopwarden --field=version

Verify Fix Applied:

After update, verify Shopwarden plugin version is 1.0.12 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=save_setting
  • Multiple failed CSRF token validations
  • Unexpected plugin setting changes in WordPress logs

Network Indicators:

  • Suspicious referrer headers in admin requests
  • Cross-origin requests to admin endpoints

SIEM Query:

source="wordpress.log" AND "save_setting" AND NOT "nonce"

🔗 References

📤 Share & Export