CVE-2024-13458

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious JavaScript into pages using the plugin's 'noticefaq' shortcode. The injected scripts execute whenever users view the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using the SEO Friendly Accordion FAQ plugin versions 2.2.1 and earlier are affected.

💻 Affected Systems

Products:
  • WordPress SEO Friendly Accordion FAQ with AI assisted content generation plugin
Versions: All versions up to and including 2.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one user with contributor-level access or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, redirect visitors to malicious sites, or use the site as a malware distribution platform.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal user session cookies, redirect users to phishing pages, or display unwanted advertisements.

🟢

If Mitigated

With proper user access controls and content moderation, the impact is limited to potential defacement of specific pages containing the shortcode.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (contributor or higher) and knowledge of WordPress shortcode usage. The vulnerability is well-documented with public proof-of-concept examples.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/notice-faq/trunk/noticefaq.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SEO Friendly Accordion FAQ with AI assisted content generation'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.2.2+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate notice-faq

Remove contributor shortcode permissions

all

Modify user roles to prevent contributors from using shortcodes

🧯 If You Can't Patch

  • Implement strict user access controls - limit contributor accounts to trusted users only
  • Enable WordPress content security policies (CSP) to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → SEO Friendly Accordion FAQ version. If version is 2.2.1 or earlier, you are vulnerable.

Check Version:

wp plugin get notice-faq --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.2.2 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode usage in post/page edits
  • Multiple failed login attempts followed by successful contributor login
  • Posts/pages with suspicious script tags in content

Network Indicators:

  • Unexpected external JavaScript loads from WordPress pages
  • Suspicious outbound connections after page views

SIEM Query:

source="wordpress" AND (event="post_edit" AND content CONTAINS "noticefaq") OR (event="plugin_update" AND plugin="notice-faq")

🔗 References

📤 Share & Export