CVE-2024-13643

8.8 HIGH

📋 TL;DR

The Zox News WordPress theme has a vulnerability that allows authenticated users with Subscriber-level access or higher to modify critical WordPress options. Attackers can escalate privileges to Administrator or delete options causing denial of service. All WordPress sites using Zox News theme versions up to 3.17.0 are affected.

💻 Affected Systems

Products:
  • Zox News - Professional WordPress News & Magazine Theme
Versions: All versions up to and including 3.17.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Zox News theme active and at least one Subscriber-level user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, modify content, install malware, and potentially compromise the entire server.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, followed by data theft, defacement, or malware injection.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, though option deletion could still cause temporary service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but only at Subscriber level, which is the lowest WordPress user role. Exploitation involves simple HTTP requests to vulnerable functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.17.1 or later

Vendor Advisory: https://mvpthemes.com/zoxnews/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check if Zox News theme has updates available. 4. Update to version 3.17.1 or later. 5. Clear any caching plugins or CDN caches.

🔧 Temporary Workarounds

Disable vulnerable theme

WordPress

Switch to a different WordPress theme temporarily until patched

wp theme activate twentytwentyfour

Restrict user registration

WordPress

Disable new user registration to prevent attacker account creation

wp option update users_can_register 0

🧯 If You Can't Patch

  • Remove Subscriber-level user accounts or restrict their capabilities
  • Implement web application firewall rules to block requests to backup_options() and reset_options() functions

🔍 How to Verify

Check if Vulnerable:

Check WordPress theme version: Navigate to Appearance > Themes and verify Zox News theme version is 3.17.0 or earlier.

Check Version:

wp theme list --name=zoxnews --field=version

Verify Fix Applied:

Confirm Zox News theme version is 3.17.1 or later in Appearance > Themes. Test that Subscriber users cannot modify WordPress options.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=backup_options or action=reset_options from non-admin users
  • Unexpected changes to wp_options table, particularly default_role or users_can_register

Network Indicators:

  • HTTP POST requests containing 'backup_options' or 'reset_options' parameters from non-admin IP addresses

SIEM Query:

source="wordpress.log" AND (action="backup_options" OR action="reset_options") AND user_role!="administrator"

🔗 References

📤 Share & Export