CVE-2024-13856

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to perform Server-Side Request Forgery (SSRF) attacks through the Make Builder plugin. Attackers can make arbitrary web requests from the vulnerable server, potentially accessing internal services and sensitive information. All WordPress sites using Make Builder plugin versions up to 1.1.10 are affected.

💻 Affected Systems

Products:
  • WordPress Make Builder plugin
Versions: All versions up to and including 1.1.10
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires at least Subscriber-level WordPress user account. Plugin must be active and the vulnerable function accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data from internal networks, perform port scanning, or attack other internal systems using the vulnerable server as a proxy.

🟠

Likely Case

Attackers with subscriber accounts could probe internal networks, access metadata services (like AWS/Azure instance metadata), or interact with internal APIs to gather information.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact would be limited to the web server's network segment only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker obtains subscriber credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.11 or later

Vendor Advisory: https://wordpress.org/plugins/make-builder/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Your Friendly Drag and Drop Page Builder — Make Builder'. 4. Click 'Update Now' if available, or manually update to version 1.1.11+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Make Builder plugin until patched

wp plugin deactivate make-builder

Restrict user registration

all

Disable new user registration to prevent attacker account creation

wp option update users_can_register 0

🧯 If You Can't Patch

  • Implement network egress filtering to restrict outbound connections from web servers
  • Apply WordPress user role restrictions and audit subscriber-level accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins, find Make Builder and verify version is 1.1.10 or lower

Check Version:

wp plugin get make-builder --field=version

Verify Fix Applied:

Confirm Make Builder plugin version is 1.1.11 or higher in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Multiple failed authentication attempts followed by successful subscriber login

Network Indicators:

  • Web server making unexpected HTTP requests to internal services
  • Traffic from web server to metadata services (169.254.169.254, etc.)

SIEM Query:

source="wordpress.log" AND ("make_builder_ajax_subscribe" OR "POST /wp-admin/admin-ajax.php") AND (destination_ip IN [internal_ranges] OR user_agent="curl" OR user_agent="wget")

🔗 References

📤 Share & Export