CVE-2024-13442

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to take over any user account, including administrators, in WordPress sites using the Service Finder Bookings plugin. Attackers can either auto-login as a user if they know the email address or change the user's password without authentication. All sites with the plugin installed up to version 5.0 are affected.

💻 Affected Systems

Products:
  • Service Finder Bookings plugin for WordPress
Versions: All versions up to and including 5.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in the default plugin configuration; no special settings are required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise: attackers gain administrative access, leading to data theft, defacement, malware injection, or complete control over the WordPress installation.

🟠

Likely Case

Account takeover of regular users or administrators, resulting in unauthorized access, privilege escalation, and potential further attacks on the site or its users.

🟢

If Mitigated

Limited impact if the plugin is disabled or removed, but sites remain vulnerable until patched, with risk reduced by strong access controls and monitoring.

🌐 Internet-Facing: HIGH, as the vulnerability is exploitable remotely without authentication, making any exposed WordPress site with the plugin a target.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it, but external threats pose a greater immediate risk due to widespread exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward, requiring only knowledge of a user's email address or ability to trigger specific plugin functions, making it highly accessible to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.0 (check vendor for exact version)

Vendor Advisory: https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Service Finder Bookings' and update to the latest version. 4. If no update is available, disable or remove the plugin immediately.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the Service Finder Bookings plugin to prevent exploitation until a patch can be applied.

wp plugin deactivate service-finder-bookings

🧯 If You Can't Patch

  • Disable or uninstall the Service Finder Bookings plugin to eliminate the vulnerability entirely.
  • Implement web application firewall (WAF) rules to block requests targeting the vulnerable plugin endpoints, such as those related to auto-login or profile updates.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins; if version is 5.0 or earlier, it is vulnerable.

Check Version:

wp plugin get service-finder-bookings --field=version

Verify Fix Applied:

After updating, confirm the plugin version is above 5.0 and test that auto-login and profile update functions require proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login attempts or password change requests for user accounts, especially from unauthenticated IP addresses, in WordPress or web server logs.

Network Indicators:

  • HTTP POST requests to plugin-specific endpoints like /wp-admin/admin-ajax.php with actions related to booking or profile updates without authentication.

SIEM Query:

source="wordpress_logs" AND (event="authentication_failure" OR event="password_change") AND plugin="service-finder-bookings"

🔗 References

📤 Share & Export