CVE-2024-13711

6.1 MEDIUM

📋 TL;DR

The Pollin WordPress plugin has a reflected cross-site scripting vulnerability in all versions up to 1.01.1. Unauthenticated attackers can inject malicious scripts via the 'question' parameter, which could steal user credentials or session cookies when victims click specially crafted links. Any WordPress site using the vulnerable Pollin plugin is affected.

💻 Affected Systems

Products:
  • Pollin WordPress Plugin
Versions: All versions up to and including 1.01.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with the Pollin plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over the WordPress site, install backdoors, or redirect users to malicious sites.

🟠

Likely Case

Attackers steal user session cookies or credentials through phishing links, potentially compromising individual user accounts.

🟢

If Mitigated

With proper web application firewalls and user awareness training, impact is limited to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but is trivial to execute once the link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.01.2 or later

Vendor Advisory: https://wordpress.org/plugins/pollin/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Pollin plugin and click 'Update Now'. 4. Verify version is 1.01.2 or higher.

🔧 Temporary Workarounds

Disable Pollin Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate pollin

Web Application Firewall Rule

all

Block requests containing malicious script patterns in the 'question' parameter

🧯 If You Can't Patch

  • Implement Content Security Policy headers to restrict script execution
  • Educate users about phishing risks and suspicious links

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Pollin version ≤1.01.1

Check Version:

wp plugin get pollin --field=version

Verify Fix Applied:

Confirm Pollin plugin version is 1.01.2 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with suspicious script tags in 'question' parameter
  • Multiple failed XSS attempts from same IP

Network Indicators:

  • Unusual GET requests with encoded script payloads in query parameters

SIEM Query:

web.url:*question=*<script* OR web.url:*question=*javascript:*

🔗 References

📤 Share & Export