CVE-2024-13835

7.2 HIGH

📋 TL;DR

The Post Meta Data Manager WordPress plugin allows authenticated attackers with Administrator access to escalate privileges on multisite installations. Attackers can gain elevated privileges on subsites they shouldn't have access to. This affects all WordPress multisite installations using the plugin up to version 1.4.3.

💻 Affected Systems

Products:
  • Post Meta Data Manager WordPress Plugin
Versions: All versions up to and including 1.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress multisite installations. Single-site WordPress installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WordPress multisite network where attackers gain super-admin privileges across all subsites, enabling data theft, defacement, malware installation, and lateral movement.

🟠

Likely Case

Attackers with administrator access on one subsite gain elevated privileges on other subsites, potentially accessing sensitive data or modifying content on unauthorized sites.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized privilege escalation attempts that are detected and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated administrator access on at least one subsite. Exploitation is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.4 or later

Vendor Advisory: https://wordpress.org/plugins/post-meta-data-manager/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Post Meta Data Manager. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.4.4+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate post-meta-data-manager

Restrict Administrator Access

all

Limit administrator accounts and implement strong access controls

🧯 If You Can't Patch

  • Remove the Post Meta Data Manager plugin entirely from multisite installations
  • Implement strict network segmentation and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Post Meta Data Manager version. If version is 1.4.3 or lower on a multisite installation, it's vulnerable.

Check Version:

wp plugin get post-meta-data-manager --field=version

Verify Fix Applied:

Verify plugin version is 1.4.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user meta modifications
  • Privilege escalation attempts in WordPress logs
  • Administrator actions from unexpected IPs

Network Indicators:

  • Unusual admin panel access patterns
  • Multiple subsite access from single administrator

SIEM Query:

source="wordpress.log" AND ("post-meta-data-manager" OR "user_meta" OR "privilege") AND ("modify" OR "escalate" OR "unauthorized")

🔗 References

📤 Share & Export