CVE-2024-13407
📋 TL;DR
The Omnipress WordPress plugin vulnerability allows authenticated attackers with Contributor-level access or higher to view password-protected, private, or draft posts they shouldn't have permission to access. This affects all WordPress sites using Omnipress plugin versions up to 1.5.4. The exposure occurs through insufficient access controls in the megamenu block functionality.
💻 Affected Systems
- WordPress Omnipress Plugin
📦 What is this software?
Omnipress by Omnipressteam
⚠️ Risk & Real-World Impact
Worst Case
Sensitive unpublished content (drafts, private posts, password-protected materials) is exposed to unauthorized users, potentially leaking confidential business information, unpublished announcements, or sensitive data.
Likely Case
Contributors or authors can view other users' draft or private posts, violating content separation and potentially exposing editorial workflows or unpublished content.
If Mitigated
With proper user role management and minimal contributor accounts, impact is limited to potential exposure of non-critical draft content.
🎯 Exploit Status
Exploitation requires authenticated access with at least Contributor privileges. Attack would involve accessing the megamenu block functionality to retrieve restricted posts.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.5.4
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Omnipress plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable Omnipress Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate omnipress
Restrict Contributor Access
allRemove Contributor roles from untrusted users and limit to minimal necessary accounts.
🧯 If You Can't Patch
- Remove Contributor and Author roles from all users except absolutely necessary personnel
- Disable the megamenu block functionality or remove it from all pages/posts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for Omnipress version. If version is 1.5.4 or lower, system is vulnerable.
Check Version:
wp plugin get omnipress --field=version
Verify Fix Applied:
Verify Omnipress plugin version is higher than 1.5.4. Test with Contributor account that megamenu block no longer shows restricted posts.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to draft/private posts by Contributor-level users
- Multiple failed access attempts to restricted content
Network Indicators:
- HTTP requests to megamenu block endpoints with post query parameters
SIEM Query:
source="wordpress" AND (uri_path="*megamenu*" OR plugin="omnipress") AND user_role="contributor" AND status=200