CVE-2024-13645

9.8 CRITICAL

📋 TL;DR

The tagDiv Composer WordPress plugin has a PHP object instantiation vulnerability that allows unauthenticated attackers to instantiate arbitrary PHP objects. This vulnerability only becomes dangerous when combined with a POP chain from another plugin or theme, which could enable remote code execution, file deletion, or data theft. All WordPress sites using tagDiv Composer versions up to 5.3 are affected.

💻 Affected Systems

Products:
  • tagDiv Composer WordPress Plugin
Versions: All versions up to and including 5.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with tagDiv Composer plugin; impact depends on presence of POP chains in other installed plugins/themes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, and server takeover if a suitable POP chain exists in another installed plugin/theme.

🟠

Likely Case

No immediate impact unless the site has vulnerable plugins/themes with POP chains; most sites will see no effect until additional vulnerable components are present.

🟢

If Mitigated

Limited to no impact if no POP chain exists in installed plugins/themes, though the vulnerability still provides an attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or crafting a suitable POP chain from other installed components; no known POP chains exist in tagDiv Composer itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.3

Vendor Advisory: https://tagdiv.com/tagdiv-composer-page-builder-basics/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find tagDiv Composer. 4. Click 'Update Now' if update available. 5. If no update shows, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable tagDiv Composer Plugin

all

Temporarily deactivate the vulnerable plugin until patched

🧯 If You Can't Patch

  • Disable or remove the tagDiv Composer plugin immediately
  • Audit and remove any unnecessary plugins/themes that might contain POP chains

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for tagDiv Composer version 5.3 or lower

Check Version:

wp plugin list --name=tagdiv-composer --field=version

Verify Fix Applied:

Verify tagDiv Composer plugin version is higher than 5.3 in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress containing PHP object serialization data
  • Unexpected plugin activation/deactivation logs

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters targeting WordPress

SIEM Query:

source="wordpress.log" AND ("tagdiv" OR "td-composer") AND ("unserialize" OR "php_object")

🔗 References

📤 Share & Export