CVE-2024-13751

6.4 MEDIUM

📋 TL;DR

The 3D Photo Gallery WordPress plugin has a stored XSS vulnerability that allows authenticated attackers with Subscriber-level access or higher to inject malicious scripts into website pages. These scripts execute automatically when users visit compromised pages, potentially stealing credentials or hijacking sessions. All WordPress sites using this plugin version 1.3 or earlier are affected.

💻 Affected Systems

Products:
  • 3D Photo Gallery WordPress Plugin
Versions: All versions up to and including 1.3
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Subscriber-level access or higher is needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, deface the website, or redirect visitors to malicious sites.

🟠

Likely Case

Attackers with subscriber accounts inject malicious scripts to steal session cookies or credentials from other users, potentially gaining administrative access.

🟢

If Mitigated

With proper input validation and output escaping, the vulnerability is eliminated; with subscriber account restrictions, risk is reduced but not eliminated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via the 'des[]' parameter. Public proof-of-concept exists in vulnerability reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WordPress plugin repository for updates after 1.3

Vendor Advisory: https://plugins.trac.wordpress.org/browser/3d-photo-gallery/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find '3D Photo Gallery' and check for update. 4. If update available, click 'Update Now'. 5. If no update, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate 3d-photo-gallery

Restrict User Registration

all

Disable new user registration to prevent attacker account creation

In WordPress Settings → General, uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Remove Subscriber role from all untrusted users and review existing subscriber accounts
  • Implement web application firewall (WAF) rules to block XSS payloads targeting the 'des[]' parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for '3D Photo Gallery' version 1.3 or earlier

Check Version:

wp plugin get 3d-photo-gallery --field=version

Verify Fix Applied:

Verify plugin version is higher than 1.3 or plugin is removed from installed plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php or plugin endpoints containing 'des[]' parameter with script tags
  • Multiple failed login attempts followed by successful subscriber login

Network Indicators:

  • HTTP requests with JavaScript payloads in 'des[]' parameter
  • Unexpected outbound connections from WordPress server after page visits

SIEM Query:

source="wordpress" AND (uri_path="*admin-ajax.php*" OR uri_path="*wp-admin*" OR uri_path="*3d-photo-gallery*") AND http_param="des[]" AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export