CVE-2024-13573

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious JavaScript into pages using the Zigaform plugin's shortcode. The injected scripts execute whenever other users view the compromised pages, enabling session hijacking, credential theft, or website defacement. All WordPress sites using vulnerable versions of Zigaform Form Builder Lite are affected.

💻 Affected Systems

Products:
  • Zigaform - Form Builder Lite WordPress Plugin
Versions: All versions up to and including 7.4.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the plugin enabled and at least one user with contributor-level access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, or redirect visitors to malicious sites, potentially compromising the entire web server and user data.

🟠

Likely Case

Malicious contributors or compromised accounts inject scripts to steal user sessions, display fraudulent content, or redirect users to phishing pages, damaging site reputation and user trust.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement of specific pages rather than full site compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. The vulnerability is well-documented with public technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3166729%40zigaform-form-builder-lite%2Ftrunk&old=3159395%40zigaform-form-builder-lite%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Zigaform - Form Builder Lite. 4. Click 'Update Now' if available, or delete and reinstall latest version. 5. Verify version is 7.4.3 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Zigaform plugin until patched

wp plugin deactivate zigaform-form-builder-lite

Restrict User Roles

linux

Remove contributor-level access from untrusted users

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Regularly audit user accounts and remove unnecessary contributor-level permissions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Zigaform - Form Builder Lite → Version. If version is 7.4.2 or lower, you are vulnerable.

Check Version:

wp plugin get zigaform-form-builder-lite --field=version

Verify Fix Applied:

After update, confirm version shows 7.4.3 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to pages with zgfm_rfvar shortcodes
  • Multiple page edits by contributor-level users

Network Indicators:

  • External script loads from unexpected domains in page responses

SIEM Query:

source="wordpress.log" AND ("zgfm_rfvar" OR "Zigaform") AND ("POST" OR "update")

🔗 References

📤 Share & Export