CVE-2024-13602

4.8 MEDIUM

📋 TL;DR

The Poll Maker WordPress plugin before version 5.5.4 contains a stored cross-site scripting (XSS) vulnerability in its settings. This allows authenticated administrators to inject malicious scripts that execute when other users view affected pages, even in WordPress multisite setups where unfiltered_html is restricted. Only WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Poll Maker WordPress Plugin
Versions: All versions before 5.5.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. WordPress multisite installations with unfiltered_html disabled are still vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin privileges could inject malicious JavaScript that steals session cookies, redirects users to phishing sites, or performs actions on behalf of authenticated users, potentially leading to full site compromise.

🟠

Likely Case

Malicious admin injects tracking scripts or defaces poll pages visible to regular users, damaging site integrity and user trust.

🟢

If Mitigated

With proper user access controls and regular plugin updates, impact is limited to minor content manipulation by trusted admins.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges. Attack involves injecting scripts through plugin settings that persist and execute when users view affected content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.4

Vendor Advisory: https://wpscan.com/vulnerability/05d5010b-94eb-4fd3-b962-e2a16c032b71/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Poll Maker' and check if version is below 5.5.4. 4. Click 'Update Now' if available, or download version 5.5.4+ from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the Poll Maker plugin until patched

wp plugin deactivate poll-maker
wp plugin delete poll-maker

Restrict admin access

all

Limit admin privileges to trusted users only and implement role-based access controls

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Use web application firewall (WAF) rules to block XSS payloads in plugin settings

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Poll Maker version. If version is below 5.5.4, system is vulnerable.

Check Version:

wp plugin get poll-maker --field=version

Verify Fix Applied:

After update, confirm Poll Maker version shows 5.5.4 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity modifying poll settings
  • JavaScript payloads in plugin configuration data

Network Indicators:

  • Suspicious outbound connections from poll pages to external domains

SIEM Query:

source="wordpress" AND (event="plugin_updated" AND plugin_name="poll-maker" AND version<"5.5.4") OR (event="settings_modified" AND plugin="poll-maker")

🔗 References

📤 Share & Export