CVE-2024-13319

6.1 MEDIUM

📋 TL;DR

The Themify Builder WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to inject malicious scripts via crafted URLs. When users click on malicious links, arbitrary JavaScript executes in their browser context. All WordPress sites using Themify Builder up to version 7.6.5 are affected.

💻 Affected Systems

Products:
  • Themify Builder WordPress Plugin
Versions: All versions up to and including 7.6.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Themify Builder plugin active. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session cookies, perform actions as authenticated users, redirect to phishing sites, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or defacement of vulnerable pages through script injection.

🟢

If Mitigated

Limited impact if users have script blockers, browsers with XSS filters, or clickjacking protection enabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link). Technical details and proof-of-concept are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3224684/themify-builder/trunk/themify/themify-admin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Themify Builder and click 'Update Now'. 4. Verify version is 7.6.6 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable Themify Builder plugin until patched

wp plugin deactivate themify-builder

Web Application Firewall Rule

linux

Block malicious query parameters containing script tags

ModSecurity rule: SecRule ARGS "<script" "id:1001,phase:2,deny"

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use browser security extensions or network filtering to block malicious URLs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Themify Builder for version number. If version is 7.6.5 or lower, system is vulnerable.

Check Version:

wp plugin get themify-builder --field=version

Verify Fix Applied:

After update, confirm version is 7.6.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious query parameters containing script tags or JavaScript code
  • Multiple 404 errors for Themify Builder endpoints with encoded payloads

Network Indicators:

  • Outbound connections to suspicious domains after visiting WordPress pages with query parameters
  • Unusual JavaScript execution patterns in browser traffic

SIEM Query:

source="wordpress.log" AND ("themify" AND ("<script" OR "javascript:" OR "onerror="))

🔗 References

📤 Share & Export