CVE-2024-13407

4.3 MEDIUM

📋 TL;DR

The Omnipress WordPress plugin vulnerability allows authenticated attackers with Contributor-level access or higher to view password-protected, private, or draft posts they shouldn't have permission to access. This affects all WordPress sites using Omnipress plugin versions up to 1.5.4. The exposure occurs through insufficient access controls in the megamenu block functionality.

💻 Affected Systems

Products:
  • WordPress Omnipress Plugin
Versions: All versions up to and including 1.5.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Omnipress plugin enabled and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive unpublished content (drafts, private posts, password-protected materials) is exposed to unauthorized users, potentially leaking confidential business information, unpublished announcements, or sensitive data.

🟠

Likely Case

Contributors or authors can view other users' draft or private posts, violating content separation and potentially exposing editorial workflows or unpublished content.

🟢

If Mitigated

With proper user role management and minimal contributor accounts, impact is limited to potential exposure of non-critical draft content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Contributor privileges. Attack would involve accessing the megamenu block functionality to retrieve restricted posts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.5.4

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Omnipress plugin. 4. Click 'Update Now' if update available. 5. If no update appears, manually download latest version from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable Omnipress Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate omnipress

Restrict Contributor Access

all

Remove Contributor roles from untrusted users and limit to minimal necessary accounts.

🧯 If You Can't Patch

  • Remove Contributor and Author roles from all users except absolutely necessary personnel
  • Disable the megamenu block functionality or remove it from all pages/posts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Omnipress version. If version is 1.5.4 or lower, system is vulnerable.

Check Version:

wp plugin get omnipress --field=version

Verify Fix Applied:

Verify Omnipress plugin version is higher than 1.5.4. Test with Contributor account that megamenu block no longer shows restricted posts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to draft/private posts by Contributor-level users
  • Multiple failed access attempts to restricted content

Network Indicators:

  • HTTP requests to megamenu block endpoints with post query parameters

SIEM Query:

source="wordpress" AND (uri_path="*megamenu*" OR plugin="omnipress") AND user_role="contributor" AND status=200

🔗 References

📤 Share & Export