CVE-2024-13777

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject PHP objects via deserialization of untrusted input in the ZoomSounds WordPress plugin. It affects all WordPress sites using ZoomSounds plugin versions up to 6.91. Actual exploitation requires a separate plugin or theme with a POP chain to be present on the target system.

💻 Affected Systems

Products:
  • ZoomSounds - WordPress Wave Audio Player with Playlist
Versions: All versions up to and including 6.91
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the ZoomSounds plugin. Impact depends on presence of POP chain in other installed plugins/themes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could achieve remote code execution, delete arbitrary files, or retrieve sensitive data from the WordPress site.

🟠

Likely Case

Most installations will not have a compatible POP chain, resulting in no immediate impact, but the vulnerability still exposes the system to potential future exploitation if vulnerable plugins are added.

🟢

If Mitigated

With proper plugin management and security controls, the risk is limited to denial of service or minor disruption even if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or crafting a compatible POP chain from other installed components. No known POP chain exists in the vulnerable plugin itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 6.91

Vendor Advisory: https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ZoomSounds plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Disable ZoomSounds Plugin

WordPress

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate zoomsounds

Web Application Firewall Rule

all

Block requests containing 'margs' parameter targeting ZoomSounds endpoints

🧯 If You Can't Patch

  • Remove ZoomSounds plugin completely from the WordPress installation
  • Implement strict input validation and sanitization at the application level

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for ZoomSounds version 6.91 or earlier

Check Version:

wp plugin get zoomsounds --field=version

Verify Fix Applied:

Verify ZoomSounds plugin version is greater than 6.91 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'margs' parameter with serialized data
  • PHP errors related to deserialization or unserialize() function

Network Indicators:

  • POST requests to WordPress endpoints with serialized data in parameters
  • Unusual traffic patterns to ZoomSounds plugin URLs

SIEM Query:

source="wordpress" AND (uri="*zoomsounds*" OR params="*margs*")

🔗 References

📤 Share & Export