CVE-2024-13628
📋 TL;DR
The WP Pricing Table WordPress plugin through version 1.1 contains a reflected cross-site scripting (XSS) vulnerability. Attackers can inject malicious scripts via unsanitized parameters, which execute when viewed by administrators or other high-privilege users. This affects all WordPress sites using vulnerable versions of the WP Pricing Table plugin.
💻 Affected Systems
- WP Pricing Table WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker could steal administrator session cookies, perform actions as the administrator (including plugin/theme installation, content modification, or user creation), or redirect to malicious sites.
Likely Case
Attackers would typically steal session cookies to gain administrative access, then install backdoors, modify content, or escalate privileges within the WordPress installation.
If Mitigated
With proper web application firewalls and security headers, the attack would be blocked or the impact limited to the specific user session.
🎯 Exploit Status
The vulnerability requires user interaction (admin must click a malicious link), but exploitation is straightforward once the link is crafted.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.2 or later
Vendor Advisory: https://wpscan.com/vulnerability/34d6c8a2-e70d-485c-a217-4a569c16b079/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WP Pricing Table' and click 'Update Now' if available. 4. If no update appears, manually download version 1.2+ from WordPress.org and replace the plugin files via FTP/SFTP.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the WP Pricing Table plugin until patched
wp plugin deactivate wp-pricing-table
Web Application Firewall rule
allBlock malicious parameter patterns in the plugin's endpoints
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use a web application firewall to block XSS payloads targeting the plugin
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for WP Pricing Table version 1.1 or earlier
Check Version:
wp plugin get wp-pricing-table --field=version
Verify Fix Applied:
Confirm WP Pricing Table plugin is updated to version 1.2 or later in WordPress admin
📡 Detection & Monitoring
Log Indicators:
- Unusual parameter values in requests to wp-pricing-table endpoints
- JavaScript payloads in URL parameters
Network Indicators:
- Requests containing script tags or JavaScript in URL parameters to plugin pages
SIEM Query:
url:*wp-pricing-table* AND (param:*<script* OR param:*javascript:* OR param:*onload=*)