CVE-2024-13517
📋 TL;DR
This stored XSS vulnerability in the Easy Digital Downloads WordPress plugin allows authenticated administrators to inject malicious scripts into page titles. The scripts execute when users view affected pages, potentially compromising their sessions or browsers. Only WordPress multi-site installations and sites with unfiltered_html disabled are affected.
💻 Affected Systems
- Easy Digital Downloads WordPress plugin
📦 What is this software?
Easy Digital Downloads by Awesomemotive
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leads to site takeover, credential theft from users, or malware distribution to visitors.
Likely Case
Session hijacking, defacement, or limited data exfiltration from users who view malicious pages.
If Mitigated
No impact if proper access controls and input validation are in place.
🎯 Exploit Status
Requires administrator-level access to WordPress, making exploitation less likely but still dangerous if admin credentials are compromised.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.3.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Easy Digital Downloads plugin. 4. Click 'Update Now' if available, or manually update to version 3.3.3+. 5. Verify update completes successfully.
🔧 Temporary Workarounds
Enable unfiltered_html for administrators
allGrant administrators the unfiltered_html capability which bypasses the vulnerable code path
Add to wp-config.php: define('DISALLOW_UNFILTERED_HTML', false);
Remove administrator access from untrusted users
allRestrict administrator accounts to only essential personnel
🧯 If You Can't Patch
- Disable the Easy Digital Downloads plugin until patched
- Implement strict access controls and monitor administrator account activity
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Easy Digital Downloads → Version. If version is 3.3.2 or lower, you are vulnerable.
Check Version:
wp plugin list --name=easy-digital-downloads --field=version
Verify Fix Applied:
Confirm plugin version is 3.3.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual title modifications in wp_posts table
- Administrator account performing unexpected title updates
Network Indicators:
- Script tags in page titles in HTTP responses
- Unexpected JavaScript execution on page load
SIEM Query:
source="wordpress" AND (event="plugin_update" AND plugin="easy-digital-downloads" AND version<="3.3.2") OR (event="post_modified" AND user_role="administrator" AND field="post_title" AND value MATCHES "<script")