CVE-2024-13364
📋 TL;DR
The Raptive Ads WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to reset ad and cls files. This affects all WordPress sites using the plugin up to version 3.6.3. Attackers can disrupt advertising functionality without needing any credentials.
💻 Affected Systems
- Raptive Ads (formerly AdThrive Ads) WordPress Plugin
📦 What is this software?
Raptive Ads by Raptive
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of advertising functionality, potential loss of ad revenue, and service disruption if ads are critical to site operation.
Likely Case
Temporary disruption of ad displays, requiring administrator intervention to restore proper ad functionality.
If Mitigated
Minimal impact with proper access controls and monitoring in place to detect and respond to unauthorized reset attempts.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoints without authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.4 or later
Vendor Advisory: https://wordpress.org/plugins/adthrive-ads/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Raptive Ads plugin. 4. Click 'Update Now' if available. 5. If manual update needed, download version 3.6.4+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the Raptive Ads plugin until patched
wp plugin deactivate adthrive-ads
Web Application Firewall Rule
allBlock access to vulnerable endpoints via WAF
Block POST requests to /wp-admin/admin-ajax.php with action parameters containing 'site_ads_files_reset' or 'cls_file_reset'
🧯 If You Can't Patch
- Implement strict network access controls to limit who can access the WordPress admin-ajax.php endpoint
- Enable detailed logging of all admin-ajax.php requests and monitor for unauthorized reset attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Raptive Ads version. If version is 3.6.3 or lower, you are vulnerable.
Check Version:
wp plugin get adthrive-ads --field=version
Verify Fix Applied:
Verify plugin version is 3.6.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=site_ads_files_reset or action=cls_file_reset from unauthenticated users
- Multiple reset attempts within short timeframes
Network Indicators:
- Unusual traffic patterns to admin-ajax.php endpoint
- HTTP 200 responses to reset requests from unauthenticated sources
SIEM Query:
source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND (action="site_ads_files_reset" OR action="cls_file_reset") AND user="-"