CVE-2024-13810

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to import demo content and overwrite the site through AJAX actions. It affects all versions of the Zass WooCommerce theme up to 3.9.9.10. The issue stems from missing capability checks on the 'zass_import_zass' AJAX endpoint.

💻 Affected Systems

Products:
  • Zass - WooCommerce Theme for Handmade Artists and Artisans
Versions: All versions up to and including 3.9.9.10
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Zass theme active and at least one authenticated user with Subscriber role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could completely overwrite the WordPress site with demo content, destroying existing content, configurations, and potentially injecting malicious code.

🟠

Likely Case

Attackers with subscriber accounts could disrupt site operations by importing unwanted demo content, causing service disruption and content loss.

🟢

If Mitigated

With proper user access controls and theme updates, the risk is limited to authorized administrative actions only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has subscriber-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.9.9.11 or later

Vendor Advisory: https://themeforest.net/item/zass-wordpress-woocommerce-theme/19614113

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Update the Zass theme to version 3.9.9.11 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or disable the vulnerable 'zass_import_zass' AJAX action handler

Add to theme's functions.php: remove_action('wp_ajax_zass_import_zass', 'zass_import_zass'); remove_action('wp_ajax_nopriv_zass_import_zass', 'zass_import_zass');

Restrict user roles

all

Temporarily restrict Subscriber role capabilities or remove unnecessary subscriber accounts

Use WordPress role management plugins or custom code to restrict AJAX capabilities for subscriber roles

🧯 If You Can't Patch

  • Implement strict user access controls and monitor for suspicious AJAX requests
  • Disable the Zass theme and switch to a secure alternative theme

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Zass theme version 3.9.9.10 or earlier

Check Version:

WordPress CLI: wp theme list --field=name,version | grep zass

Verify Fix Applied:

Confirm Zass theme version is 3.9.9.11 or later in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to wp-admin/admin-ajax.php with action=zass_import_zass
  • Multiple content import operations from non-admin users

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with zass_import_zass parameter from unexpected IPs

SIEM Query:

source="wordpress" AND uri="/wp-admin/admin-ajax.php" AND post_data="action=zass_import_zass" AND user_role!="administrator"

🔗 References

📤 Share & Export