CVE-2024-13579

6.4 MEDIUM

📋 TL;DR

The WP-Asambleas WordPress plugin has a stored XSS vulnerability in its 'polls_popup' shortcode that allows authenticated attackers with contributor-level access or higher to inject malicious scripts into pages. These scripts execute when users visit the compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using WP-Asambleas plugin versions up to 2.85.0 are affected.

💻 Affected Systems

Products:
  • WP-Asambleas WordPress Plugin
Versions: All versions up to and including 2.85.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WP-Asambleas plugin enabled and at least one user with contributor-level access or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, deface websites, redirect users to malicious sites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts to steal session cookies or credentials from users visiting affected pages, leading to account takeover.

🟢

If Mitigated

With proper input validation and output escaping, malicious scripts are neutralized before execution, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (contributor or higher) and knowledge of the vulnerable shortcode. The vulnerability is well-documented with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.85.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-asambleas/trunk/modules/shortcodes.php#L999

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP-Asambleas plugin. 4. Click 'Update Now' if update available. 5. If no update available, manually download version 2.85.1+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the WP-Asambleas plugin until patched

wp plugin deactivate wp-asambleas

Remove Contributor Access

linux

Temporarily remove contributor-level access from untrusted users

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Remove the WP-Asambleas plugin completely from the WordPress installation
  • Implement a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP-Asambleas version. If version is 2.85.0 or lower, the site is vulnerable.

Check Version:

wp plugin get wp-asambleas --field=version

Verify Fix Applied:

After updating, verify WP-Asambleas plugin version is 2.85.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode usage in post/page content
  • Multiple failed login attempts followed by successful contributor login
  • Posts/pages with suspicious script tags or encoded payloads

Network Indicators:

  • Outbound connections to suspicious domains from WordPress site
  • Unexpected JavaScript execution in browser developer tools

SIEM Query:

source="wordpress" AND (plugin="wp-asambleas" AND version<="2.85.0") OR (event="post_edit" AND user_role="contributor" AND content CONTAINS "polls_popup")

🔗 References

📤 Share & Export