CVE-2024-13753

8.1 HIGH

📋 TL;DR

This CSRF vulnerability in the Ultimate Classified Listings WordPress plugin allows unauthenticated attackers to change victim email addresses by tricking users into clicking malicious links. All WordPress sites using plugin versions up to 1.4 are affected. Successful exploitation could lead to account takeover through password reset mechanisms.

💻 Affected Systems

Products:
  • Ultimate Classified Listings WordPress Plugin
Versions: All versions up to and including 1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of WordPress administrators or users, leading to data theft, site defacement, or malware distribution.

🟠

Likely Case

Targeted email modification attacks leading to account compromise through password reset hijacking.

🟢

If Mitigated

Limited impact with proper CSRF protections, user awareness training, and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated users into clicking malicious links. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.4

Vendor Advisory: https://plugins.trac.wordpress.org/browser/ultimate-classified-listings

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Ultimate Classified Listings. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ultimate-classified-listings

Add CSRF Protection

all

Implement custom nonce validation for update_profile function

Add wp_verify_nonce() check before processing update_profile requests

🧯 If You Can't Patch

  • Implement web application firewall with CSRF protection rules
  • Restrict plugin access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Installed Plugins

Check Version:

wp plugin get ultimate-classified-listings --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.4 and check that wp_verify_nonce() is present in update_profile function

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=update_profile without valid nonce
  • Unusual email change requests from same IP

Network Indicators:

  • POST requests containing 'update_profile' parameter without '_wpnonce' field
  • Cross-origin requests to admin-ajax.php

SIEM Query:

source="wordpress.log" AND "action=update_profile" AND NOT "_wpnonce="

🔗 References

📤 Share & Export