CVE-2024-13703

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to enable/disable plugin widgets without proper authorization. It affects all WordPress sites using the CRM and Lead Management by vcita plugin up to version 2.7.1. Attackers can disrupt plugin functionality but cannot directly access sensitive data.

💻 Affected Systems

Products:
  • CRM and Lead Management by vcita WordPress plugin
Versions: All versions up to and including 2.7.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious users could disable critical CRM widgets, disrupting lead capture and customer management functions, potentially causing business impact.

🟠

Likely Case

Low-privilege users could toggle widget visibility, causing minor interface disruptions but no data compromise.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to temporary widget visibility changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending crafted AJAX requests to the vulnerable function. No authentication bypass needed beyond basic WordPress user account.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3166158%40crm-customer-relationship-management-by-vcita%2Ftrunk&old=3159625%40crm-customer-relationship-management-by-vcita%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'CRM and Lead Management by vcita'. 4. Click 'Update Now' if available, or manually update to version 2.7.2+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Remove vulnerable plugin

linux

Temporarily disable or remove the plugin until patched

wp plugin deactivate crm-customer-relationship-management-by-vcita
wp plugin delete crm-customer-relationship-management-by-vcita

Restrict user roles

all

Limit Subscriber-level accounts or implement additional access controls

🧯 If You Can't Patch

  • Disable the vcita plugin entirely until patching is possible
  • Implement web application firewall rules to block requests to vcita_ajax_toggle_ae function

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > CRM and Lead Management by vcita. If version is 2.7.1 or lower, you are vulnerable.

Check Version:

wp plugin get crm-customer-relationship-management-by-vcita --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.7.2 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=vcita_ajax_toggle_ae from non-admin users
  • Unusual widget configuration changes in vcita plugin logs

Network Indicators:

  • AJAX requests to toggle widget settings from unauthorized user accounts

SIEM Query:

source="wordpress" AND uri="/wp-admin/admin-ajax.php" AND post_data="action=vcita_ajax_toggle_ae" AND user_role!="administrator"

🔗 References

📤 Share & Export