CVE-2024-13377

7.2 HIGH

📋 TL;DR

The Gravity Forms WordPress plugin has a stored XSS vulnerability in the 'alt' parameter that allows unauthenticated attackers to inject malicious scripts. When users visit pages containing the injected forms, their browsers execute the attacker's code. All WordPress sites using Gravity Forms versions up to 2.9.1.3 are affected.

💻 Affected Systems

Products:
  • Gravity Forms WordPress Plugin
Versions: All versions up to and including 2.9.1.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with Gravity Forms plugin enabled are vulnerable. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies, redirect users to phishing pages, or display unwanted advertisements.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability is prevented and no malicious scripts can be stored or executed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attackers can exploit this without authentication by submitting specially crafted form submissions containing malicious scripts in the 'alt' parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.1.4 or later

Vendor Advisory: https://docs.gravityforms.com/gravityforms-change-log/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Gravity Forms and click 'Update Now'. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Gravity Forms Plugin

WordPress

Temporarily disable the Gravity Forms plugin until patching is possible

wp plugin deactivate gravityforms

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with XSS protection rules
  • Restrict form submissions to authenticated users only

🔍 How to Verify

Check if Vulnerable:

Check Gravity Forms version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin get gravityforms --field=version

Verify Fix Applied:

Verify Gravity Forms version is 2.9.1.4 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual form submissions with script tags in alt parameter
  • Multiple failed form submissions from same IP

Network Indicators:

  • HTTP POST requests to Gravity Forms endpoints containing script tags

SIEM Query:

source="wordpress.log" AND "gravityforms" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export