CVE-2024-13444

6.1 MEDIUM

📋 TL;DR

The wp-greet WordPress plugin has a Cross-Site Request Forgery vulnerability that allows attackers to trick administrators into clicking malicious links, which can then update plugin settings or inject malicious scripts. All WordPress sites using wp-greet version 6.2 or earlier are affected. This vulnerability requires administrator interaction but no authentication.

💻 Affected Systems

Products:
  • WordPress wp-greet plugin
Versions: All versions up to and including 6.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject persistent malicious scripts that affect all site visitors, potentially leading to credential theft, malware distribution, or complete site compromise.

🟠

Likely Case

Attackers would inject malicious JavaScript to steal administrator cookies/sessions or redirect users to phishing sites, compromising individual user accounts.

🟢

If Mitigated

With proper CSRF protections and administrator awareness, the attack would fail as nonce validation would block unauthorized requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators but uses standard CSRF techniques with low technical complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 6.2

Vendor Advisory: https://wordpress.org/plugins/wp-greet/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find wp-greet plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the wp-greet plugin until patched version is available

wp plugin deactivate wp-greet

Web Application Firewall Rules

all

Implement WAF rules to block CSRF attacks targeting wp-greet endpoints

🧯 If You Can't Patch

  • Deactivate and remove the wp-greet plugin immediately
  • Implement strict Content Security Policy headers to limit script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for wp-greet version 6.2 or earlier

Check Version:

wp plugin get wp-greet --field=version

Verify Fix Applied:

Verify wp-greet plugin version is higher than 6.2 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to wp-greet admin endpoints without proper nonce
  • Multiple failed nonce validation attempts

Network Indicators:

  • CSRF attack patterns targeting /wp-admin/admin.php?page=wp-greet
  • Malicious iframe or form submissions to plugin endpoints

SIEM Query:

source="wordpress" AND (uri="/wp-admin/admin.php?page=wp-greet" OR plugin="wp-greet") AND (status=200 OR method="POST")

🔗 References

📤 Share & Export