CVE-2024-13656

8.1 HIGH

📋 TL;DR

This vulnerability in the Click Mag WordPress theme allows authenticated attackers with subscriber-level access or higher to delete arbitrary WordPress option values, potentially causing site errors and denial of service. It affects all versions up to and including 3.6.0 due to a missing capability check in the propanel_of_ajax_callback() function.

💻 Affected Systems

Products:
  • Click Mag - Viral WordPress News Magazine/Blog Theme
Versions: All versions up to and including 3.6.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Click Mag theme active; vulnerability is present in default configurations without additional security plugins.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers delete critical WordPress options (e.g., siteurl, home) or theme settings, causing the site to crash or become inaccessible, leading to extended downtime and data loss.

🟠

Likely Case

Attackers delete non-critical options, causing minor site errors or functionality breaks, but may escalate to denial of service if key options are targeted.

🟢

If Mitigated

With proper access controls (e.g., least privilege) and monitoring, impact is limited to minor disruptions, as attacks are logged and can be quickly reverted.

🌐 Internet-Facing: HIGH, as WordPress sites are typically internet-facing, and subscriber accounts are common, increasing exposure to exploitation.
🏢 Internal Only: LOW, assuming internal networks restrict subscriber access, but risk rises if internal users have such privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access (subscriber or higher) and knowledge of WordPress AJAX endpoints, but no advanced skills are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.6.0 (check theme updates for exact version)

Vendor Advisory: https://themeforest.net/item/click-mag-viral-wordpress-news-magazineblog-theme/18081003

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Find Click Mag theme and check for updates. 4. If an update is available, click 'Update Now'. 5. Verify the theme version is above 3.6.0.

🔧 Temporary Workarounds

Restrict User Capabilities

all

Limit subscriber and higher roles from accessing theme-specific AJAX functions by modifying user roles or using security plugins.

Use a plugin like 'User Role Editor' to remove unnecessary capabilities from subscriber roles.

🧯 If You Can't Patch

  • Deactivate the Click Mag theme and switch to a secure alternative until patched.
  • Implement strict access controls and monitor for suspicious activity, such as unexpected option deletions in WordPress logs.

🔍 How to Verify

Check if Vulnerable:

Check the theme version in WordPress admin under Appearance > Themes; if Click Mag is version 3.6.0 or lower, it is vulnerable.

Check Version:

In WordPress, use: wp theme list --field=name,version | grep 'Click Mag' (requires WP-CLI)

Verify Fix Applied:

After updating, confirm the theme version is above 3.6.0 in the same location and test site functionality for errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to theme-specific endpoints (e.g., propanel_of_ajax_callback) from subscriber accounts, followed by option deletion logs in WordPress debug or error logs.

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action parameters related to the theme, from non-admin user IPs.

SIEM Query:

Example: source="wordpress_logs" AND (message="*propanel_of_ajax_callback*" OR message="*delete_option*") AND user_role="subscriber"

🔗 References

📤 Share & Export