CVE-2024-13798

5.3 MEDIUM

📋 TL;DR

The Post Grid and Gutenberg Blocks – ComboBlocks WordPress plugin has an input validation vulnerability that allows unauthenticated attackers to create fake paid orders without payment. This affects all WordPress sites using the plugin up to version 2.3.5. Attackers can exploit this to create fraudulent orders and potentially disrupt e-commerce operations.

💻 Affected Systems

Products:
  • Post Grid and Gutenberg Blocks – ComboBlocks WordPress plugin
Versions: All versions up to and including 2.3.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. Requires the plugin's order functionality to be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass creation of fraudulent orders leading to inventory depletion, financial losses from shipping/fulfillment of unpaid orders, and reputational damage to the business.

🟠

Likely Case

Limited fraudulent orders created by opportunistic attackers, causing administrative overhead and potential inventory discrepancies.

🟢

If Mitigated

No impact if plugin is patched or disabled, or if order validation occurs at payment gateway level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in form field validation, making exploitation straightforward for attackers with basic web knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3242737%40post-grid&new=3242737%40post-grid&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Post Grid and Gutenberg Blocks – ComboBlocks'. 4. Click 'Update Now' if available, or manually update to version 2.3.6+. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the ComboBlocks plugin until patched

Implement web application firewall rules

all

Block suspicious order creation requests at WAF level

🧯 If You Can't Patch

  • Disable the ComboBlocks plugin immediately
  • Implement server-side validation for all order creation requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ComboBlocks version. If version is 2.3.5 or lower, you are vulnerable.

Check Version:

wp plugin list --name='post-grid' --field=version

Verify Fix Applied:

After updating, verify the plugin shows version 2.3.6 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual order creation spikes
  • Orders marked as paid without corresponding payment gateway logs
  • Orders from unauthenticated users

Network Indicators:

  • POST requests to order creation endpoints without authentication
  • Unusual patterns in /wp-admin/admin-ajax.php requests

SIEM Query:

source="wordpress.log" AND ("order_created" OR "new_order") AND NOT user_authenticated=true

🔗 References

📤 Share & Export