CVE-2024-13776

8.1 HIGH

📋 TL;DR

The ZoomSounds WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify WordPress option values. This can lead to denial of service by creating site errors or potentially enabling features like user registration. All WordPress sites using ZoomSounds plugin versions up to 6.91 are affected.

💻 Affected Systems

Products:
  • ZoomSounds - WordPress Wave Audio Player with Playlist
Versions: All versions up to and including 6.91
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ZoomSounds plugin and at least one authenticated user account (Subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable the entire WordPress site by setting critical options to values that cause fatal errors, creating persistent denial of service for all legitimate users.

🟠

Likely Case

Attackers with subscriber accounts modify plugin settings to disrupt audio functionality or enable unwanted features, causing service degradation.

🟢

If Mitigated

With proper user role management and network segmentation, impact is limited to minor configuration changes that can be quickly reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple AJAX calls. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 6.91

Vendor Advisory: https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ZoomSounds plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or block access to the vulnerable 'dzsap_delete_notice' AJAX action

Add to theme's functions.php or custom plugin: remove_action('wp_ajax_dzsap_delete_notice', 'dzsap_delete_notice');
Add to .htaccess if using Apache: RewriteRule ^wp-admin/admin-ajax\.php.*dzsap_delete_notice - [F]

🧯 If You Can't Patch

  • Deactivate and remove the ZoomSounds plugin completely
  • Implement strict user role management and audit all subscriber-level accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ZoomSounds version 6.91 or lower

Check Version:

wp plugin list --name=zoomsounds --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify ZoomSounds plugin version is higher than 6.91 or plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=dzsap_delete_notice
  • Unauthorized option value changes in WordPress database

Network Indicators:

  • AJAX calls to dzsap_delete_notice endpoint from non-admin users

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "dzsap_delete_notice"

🔗 References

📤 Share & Export