CVE-2024-13628

6.1 MEDIUM

📋 TL;DR

The WP Pricing Table WordPress plugin through version 1.1 contains a reflected cross-site scripting (XSS) vulnerability. Attackers can inject malicious scripts via unsanitized parameters, which execute when viewed by administrators or other high-privilege users. This affects all WordPress sites using vulnerable versions of the WP Pricing Table plugin.

💻 Affected Systems

Products:
  • WP Pricing Table WordPress plugin
Versions: All versions through 1.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the WP Pricing Table plugin enabled. The vulnerability is in the plugin's parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform actions as the administrator (including plugin/theme installation, content modification, or user creation), or redirect to malicious sites.

🟠

Likely Case

Attackers would typically steal session cookies to gain administrative access, then install backdoors, modify content, or escalate privileges within the WordPress installation.

🟢

If Mitigated

With proper web application firewalls and security headers, the attack would be blocked or the impact limited to the specific user session.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires user interaction (admin must click a malicious link), but exploitation is straightforward once the link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.2 or later

Vendor Advisory: https://wpscan.com/vulnerability/34d6c8a2-e70d-485c-a217-4a569c16b079/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Pricing Table' and click 'Update Now' if available. 4. If no update appears, manually download version 1.2+ from WordPress.org and replace the plugin files via FTP/SFTP.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the WP Pricing Table plugin until patched

wp plugin deactivate wp-pricing-table

Web Application Firewall rule

all

Block malicious parameter patterns in the plugin's endpoints

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Use a web application firewall to block XSS payloads targeting the plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for WP Pricing Table version 1.1 or earlier

Check Version:

wp plugin get wp-pricing-table --field=version

Verify Fix Applied:

Confirm WP Pricing Table plugin is updated to version 1.2 or later in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual parameter values in requests to wp-pricing-table endpoints
  • JavaScript payloads in URL parameters

Network Indicators:

  • Requests containing script tags or JavaScript in URL parameters to plugin pages

SIEM Query:

url:*wp-pricing-table* AND (param:*<script* OR param:*javascript:* OR param:*onload=*)

🔗 References

📤 Share & Export