CVE-2024-13924
📋 TL;DR
The Starter Templates by FancyWP WordPress plugin has a blind SSRF vulnerability that allows unauthenticated attackers to make arbitrary HTTP requests from the web server. This can be used to probe internal networks, access internal services, or interact with cloud metadata APIs. All WordPress sites using this plugin up to version 2.0.0 are affected.
💻 Affected Systems
- Starter Templates by FancyWP WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal services, retrieve cloud metadata credentials, or pivot to attack other internal systems from the compromised web server.
Likely Case
Attackers scan internal networks, access internal APIs, or interact with services that shouldn't be exposed externally.
If Mitigated
Limited to port scanning internal networks if proper network segmentation and egress filtering are in place.
🎯 Exploit Status
SSRF vulnerabilities are commonly exploited and tooling exists for automated exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.1 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/starter-templates/trunk/classess/class-export.php#L3
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Starter Templates by FancyWP'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.0.1+ from WordPress.org and replace the plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the Starter Templates plugin until patched
wp plugin deactivate starter-templates
Restrict outbound web requests
linuxConfigure web server firewall to block outbound HTTP requests from the web application
🧯 If You Can't Patch
- Implement network segmentation to isolate web servers from internal services
- Deploy web application firewall with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Starter Templates by FancyWP version. If version is 2.0.0 or lower, you are vulnerable.
Check Version:
wp plugin get starter-templates --field=version
Verify Fix Applied:
Verify plugin version is 2.0.1 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from web server to internal IPs
- Requests to cloud metadata endpoints (169.254.169.254, etc.)
Network Indicators:
- Web server making unexpected outbound HTTP requests
- Requests to internal network ranges from web application
SIEM Query:
source="web_server_logs" dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 169.254.169.254) AND http_method="GET"