CVE-2024-13395

6.4 MEDIUM

📋 TL;DR

The Threepress WordPress plugin has a stored cross-site scripting vulnerability that allows authenticated attackers with contributor-level access or higher to inject malicious scripts into website pages. These scripts execute whenever users view the compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using Threepress plugin versions up to 1.7.1 are affected.

💻 Affected Systems

Products:
  • WordPress Threepress Plugin
Versions: All versions up to and including 1.7.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Threepress plugin enabled and at least one user with contributor-level access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, deface content, or redirect users to malicious sites, potentially leading to complete site compromise and data theft.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, perform actions as authenticated users, or display phishing content to visitors.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to potential defacement of specific pages without credential theft.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (contributor or higher). The vulnerability is in the 'threepress' shortcode attribute handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.2

Vendor Advisory: https://plugins.trac.wordpress.org/browser/threepress/tags/1.7.2/threepress.php#L263

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Threepress plugin and click 'Update Now'. 4. Alternatively, download version 1.7.2 from WordPress plugin repository and manually replace the plugin files.

🔧 Temporary Workarounds

Disable Threepress Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate threepress

Restrict User Roles

linux

Temporarily remove contributor-level access from untrusted users

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use web application firewall rules to block suspicious shortcode attributes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Threepress version. If version is 1.7.1 or lower, you are vulnerable.

Check Version:

wp plugin get threepress --field=version

Verify Fix Applied:

After updating, verify Threepress plugin shows version 1.7.2 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin with threepress shortcode parameters containing script tags
  • Multiple page edits by contributor-level users in short timeframe

Network Indicators:

  • Outbound connections to suspicious domains from your WordPress site after page views

SIEM Query:

source="wordpress.log" AND ("threepress" AND ("<script" OR "javascript:" OR "onerror="))

🔗 References

📤 Share & Export