CVE-2024-13800

8.1 HIGH

📋 TL;DR

The ConvertPlus WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify critical WordPress options. This can cause denial of service by creating site errors or enable unwanted features like registration. All WordPress sites using ConvertPlus versions up to 3.5.30 are affected.

💻 Affected Systems

Products:
  • ConvertPlus WordPress Plugin
Versions: All versions up to and including 3.5.30
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with ConvertPlus plugin active. Vulnerability requires authenticated access (Subscriber role or higher).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable the entire WordPress site by setting critical options to values that cause fatal errors, resulting in complete service disruption.

🟠

Likely Case

Attackers with subscriber accounts modify options to cause partial site errors or enable features like user registration against administrator intent.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor configuration changes that can be quickly reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of WordPress option names to target. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.5.31 or later

Vendor Advisory: https://www.convertplug.com/plus/product/convertplug/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find ConvertPlus and click 'Update Now'. 4. Verify update to version 3.5.31 or higher.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or restrict access to the vulnerable cp_dismiss_notice AJAX endpoint

Add to theme's functions.php or custom plugin: remove_action('wp_ajax_cp_dismiss_notice', 'cp_dismiss_notice');

🧯 If You Can't Patch

  • Restrict user registration and review existing subscriber accounts for suspicious activity
  • Implement web application firewall rules to block requests to wp-admin/admin-ajax.php with cp_dismiss_notice action

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ConvertPlus version. If version is 3.5.30 or lower, system is vulnerable.

Check Version:

wp plugin list --name=convertplus --field=version

Verify Fix Applied:

After update, confirm ConvertPlus version shows 3.5.31 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=cp_dismiss_notice from non-admin users
  • WordPress option changes in wp_options table without corresponding admin actions

Network Indicators:

  • HTTP POST requests to admin-ajax.php with cp_dismiss_notice parameter from unexpected IPs

SIEM Query:

source="web_access_logs" AND uri_path="/wp-admin/admin-ajax.php" AND post_data="action=cp_dismiss_notice" AND user_role!="administrator"

🔗 References

📤 Share & Export