CVE-2024-13517

4.4 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Easy Digital Downloads WordPress plugin allows authenticated administrators to inject malicious scripts into page titles. The scripts execute when users view affected pages, potentially compromising their sessions or browsers. Only WordPress multi-site installations and sites with unfiltered_html disabled are affected.

💻 Affected Systems

Products:
  • Easy Digital Downloads WordPress plugin
Versions: All versions up to and including 3.3.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Only affects WordPress multi-site installations and installations where unfiltered_html capability is disabled for administrators.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leads to site takeover, credential theft from users, or malware distribution to visitors.

🟠

Likely Case

Session hijacking, defacement, or limited data exfiltration from users who view malicious pages.

🟢

If Mitigated

No impact if proper access controls and input validation are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires administrator-level access to WordPress, making exploitation less likely but still dangerous if admin credentials are compromised.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3131805%40easy-digital-downloads&new=3131805%40easy-digital-downloads&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Easy Digital Downloads plugin. 4. Click 'Update Now' if available, or manually update to version 3.3.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Enable unfiltered_html for administrators

all

Grant administrators the unfiltered_html capability which bypasses the vulnerable code path

Add to wp-config.php: define('DISALLOW_UNFILTERED_HTML', false);

Remove administrator access from untrusted users

all

Restrict administrator accounts to only essential personnel

🧯 If You Can't Patch

  • Disable the Easy Digital Downloads plugin until patched
  • Implement strict access controls and monitor administrator account activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Easy Digital Downloads → Version. If version is 3.3.2 or lower, you are vulnerable.

Check Version:

wp plugin list --name=easy-digital-downloads --field=version

Verify Fix Applied:

Confirm plugin version is 3.3.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual title modifications in wp_posts table
  • Administrator account performing unexpected title updates

Network Indicators:

  • Script tags in page titles in HTTP responses
  • Unexpected JavaScript execution on page load

SIEM Query:

source="wordpress" AND (event="plugin_update" AND plugin="easy-digital-downloads" AND version<="3.3.2") OR (event="post_modified" AND user_role="administrator" AND field="post_title" AND value MATCHES "<script")

🔗 References

📤 Share & Export