CVE-2024-13687

4.3 MEDIUM

📋 TL;DR

The Team Builder WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify plugin settings. This affects all WordPress sites using plugin versions 1.3 and earlier. Attackers can change configuration options without proper permissions.

💻 Affected Systems

Products:
  • Team Builder – Meet the Team WordPress Plugin
Versions: All versions up to and including 1.3
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable security features, modify team display settings to inject malicious content, or disrupt website functionality by changing critical plugin configurations.

🟠

Likely Case

Low-privileged users could alter team member information, change display settings, or modify plugin behavior in ways that could enable further attacks or defacement.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to minor configuration changes that can be reverted by administrators.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - attackers just need to send crafted requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WordPress plugin repository for version >1.3

Vendor Advisory: https://plugins.trac.wordpress.org/browser/team-display/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Team Builder – Meet the Team'. 4. Click 'Update Now' if update available. 5. If no update, deactivate and remove plugin.

🔧 Temporary Workarounds

Remove Subscriber Role Access

all

Temporarily restrict Subscriber role users from accessing the site while maintaining higher-privilege user access.

Use WordPress role management plugins or custom code to restrict Subscriber access

Deactivate Plugin

linux

Temporarily disable the vulnerable plugin until patched version is available.

wp plugin deactivate team-display

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests to the vulnerable save_team_builder_options() endpoint
  • Monitor and audit plugin setting changes and investigate any unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Team Builder – Meet the Team. If version is 1.3 or lower, you are vulnerable.

Check Version:

wp plugin get team-display --field=version

Verify Fix Applied:

After update, verify plugin version is higher than 1.3. Test with Subscriber account that save_team_builder_options function is properly protected.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=save_team_builder_options from low-privilege users
  • Unauthorized plugin setting changes in WordPress logs

Network Indicators:

  • HTTP POST requests containing team_builder_options parameters from non-admin users

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "save_team_builder_options") AND user_role="subscriber"

🔗 References

📤 Share & Export