CVE-2024-13420

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to reset and modify plugin/theme settings due to missing capability checks on AJAX actions. It affects multiple WordPress plugins and themes from Envato. Attackers can alter configuration settings without proper authorization.

💻 Affected Systems

Products:
  • Beyot WordPress Real Estate Theme
  • Other unspecified Envato WordPress plugins/themes
Versions: Various versions prior to partial patches
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations using vulnerable Envato plugins/themes. Requires authenticated access (Subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reset critical plugin settings, disable security features, or modify configuration to enable further attacks, potentially leading to site compromise or data exposure.

🟠

Likely Case

Unauthorized users modify theme/plugin settings, causing site functionality issues, broken layouts, or minor configuration changes that require administrative cleanup.

🟢

If Mitigated

With proper user role management and network segmentation, impact is limited to non-critical configuration changes that can be restored from backups.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple AJAX requests. The vulnerability has been publicly disclosed with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest versions of affected plugins/themes

Vendor Advisory: https://themeforest.net/item/beyot-wordpress-real-estate-theme/19514964

Restart Required: No

Instructions:

1. Update all affected WordPress plugins and themes to latest versions. 2. Verify patches are applied by checking version numbers. 3. Monitor Envato/developer communications for additional fixes.

🔧 Temporary Workarounds

Restrict User Registration

all

Disable new user registration or limit to trusted users only

WordPress Admin → Settings → General → Membership: Uncheck 'Anyone can register'

Remove Vulnerable Components

all

Temporarily disable or remove affected plugins/themes until patched

WordPress Admin → Plugins → Deactivate vulnerable plugins
WordPress Admin → Appearance → Themes → Switch to default theme

🧯 If You Can't Patch

  • Implement strict user role management and review all user accounts
  • Monitor AJAX requests in WordPress logs for suspicious activity patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin for affected plugin/theme versions. Review user roles and capabilities.

Check Version:

WordPress Admin → Plugins/Themes → View version numbers

Verify Fix Applied:

Verify all plugins/themes are updated to latest versions. Test AJAX endpoints with Subscriber accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests from non-admin users to gsf_* endpoints
  • Multiple configuration reset events in short timeframes

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action parameters like gsf_reset_section_options

SIEM Query:

source="wordpress.log" AND (action="gsf_reset_section_options" OR action="gsf_create_preset_options") AND user_role!="administrator"

🔗 References

📤 Share & Export