CVE-2024-13410

9.8 CRITICAL

📋 TL;DR

This CVE describes a PHP Object Injection vulnerability in CozyStay and TinySalt WordPress plugins. Unauthenticated attackers can inject PHP objects via deserialization of untrusted input, but exploitation requires a separate POP chain from another plugin or theme. Sites using vulnerable versions of these plugins are affected.

💻 Affected Systems

Products:
  • CozyStay WordPress Theme
  • TinySalt WordPress Theme
Versions: CozyStay up to and including 1.7.0; TinySalt up to and including 3.9.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires WordPress installation with affected theme activated. Impact depends on presence of POP chains from other plugins/themes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could execute arbitrary code, delete files, or steal sensitive data, potentially leading to complete site compromise.

🟠

Likely Case

Most sites will not have compatible POP chains, resulting in no immediate impact, though the vulnerability still exists and could be exploited if vulnerable plugins/themes are added later.

🟢

If Mitigated

With proper plugin management and no compatible POP chains installed, the vulnerability has no practical impact despite its high CVSS score.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or crafting a compatible POP chain from other installed plugins/themes, which adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CozyStay >1.7.0; TinySalt >3.9.0

Vendor Advisory: https://themeforest.net/item/cozystay-hotel-booking-wordpress-theme/47383367#item-description__changelog

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for updates to CozyStay or TinySalt themes. 4. Update to latest version. 5. If no update available, replace with alternative theme.

🔧 Temporary Workarounds

Disable vulnerable themes

all

Deactivate and replace CozyStay/TinySalt themes with secure alternatives

Restrict AJAX endpoints

all

Use web application firewall to block access to vulnerable ajax_handler endpoints

🧯 If You Can't Patch

  • Remove or disable all unnecessary plugins/themes to reduce POP chain availability
  • Implement strict input validation and sanitization at application layer

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for CozyStay version ≤1.7.0 or TinySalt version ≤3.9.0

Check Version:

wp theme list --field=name,version --format=csv

Verify Fix Applied:

Confirm theme version is CozyStay >1.7.0 or TinySalt >3.9.0 in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with serialized data
  • PHP warnings related to deserialization

Network Indicators:

  • HTTP requests containing serialized PHP objects in parameters

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND ("cozystay" OR "tinysalt") AND POST

🔗 References

📤 Share & Export