CVE-2024-13834

5.4 MEDIUM

📋 TL;DR

This vulnerability in the Responsive Plus WordPress plugin allows authenticated attackers with contributor-level access or higher to perform Server-Side Request Forgery (SSRF) attacks. Attackers can make arbitrary web requests from the vulnerable server, potentially accessing internal services and sensitive information. All WordPress sites using this plugin up to version 3.1.4 are affected.

💻 Affected Systems

Products:
  • Responsive Plus – Starter Templates, Advanced Features and Customizer Settings for Responsive Theme WordPress plugin
Versions: All versions up to and including 3.1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with contributor-level privileges or higher. WordPress multisite installations are also affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data from internal networks, perform port scanning of internal systems, or chain with other vulnerabilities to achieve remote code execution.

🟠

Likely Case

Attackers with contributor access could probe internal networks, access metadata services (like AWS IMDS), or interact with internal APIs to gather information about the infrastructure.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to information disclosure from services accessible to the web server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. The vulnerability is in the 'remote_request' function which accepts arbitrary URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3240422/responsive-add-ons

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Responsive Plus' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.1.5+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Responsive Plus plugin until patched

wp plugin deactivate responsive-add-ons

Restrict user roles

all

Remove contributor-level access from untrusted users

🧯 If You Can't Patch

  • Implement network segmentation to restrict web server access to internal services
  • Deploy web application firewall rules to block SSRF patterns and unusual outbound requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Responsive Plus' version 3.1.4 or lower

Check Version:

wp plugin get responsive-add-ons --field=version

Verify Fix Applied:

Verify plugin version is 3.1.5 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Requests to metadata services (169.254.169.254, 100.100.100.200)
  • Multiple failed authentication attempts followed by SSRF patterns

Network Indicators:

  • Web server making requests to internal network ranges
  • Unusual traffic patterns from web server to non-standard ports

SIEM Query:

source="web_server_logs" AND (url CONTAINS "internal_ip" OR url CONTAINS "metadata" OR url CONTAINS "localhost")

🔗 References

📤 Share & Export