CVE-2024-13940

5.5 MEDIUM

📋 TL;DR

The Ninja Forms Webhooks plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated administrators to make arbitrary web requests from the vulnerable server. This could enable attackers to query or modify internal services accessible from the web server. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Ninja Forms Webhooks WordPress Plugin
Versions: All versions up to and including 3.0.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Ninja Forms Webhooks plugin enabled and an authenticated administrator account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator-level attacker could access internal services, exfiltrate sensitive data from internal networks, or perform attacks against internal systems using the web server as a proxy.

🟠

Likely Case

Compromised administrator account could be used to scan internal networks, access metadata services, or interact with internal APIs that shouldn't be exposed externally.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to services reachable from the web server's network position.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator-level access to WordPress. The vulnerability is in the webhook functionality that processes form submissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.8 or later

Vendor Advisory: https://ninjaforms.com/extensions/webhooks/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ninja Forms Webhooks. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ninja-forms-webhooks

Restrict Administrator Access

all

Limit administrator accounts to trusted users only

🧯 If You Can't Patch

  • Implement network segmentation to restrict web server access to internal services
  • Apply strict access controls and monitor administrator account activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Ninja Forms Webhooks → Version. If version is 3.0.7 or lower, you are vulnerable.

Check Version:

wp plugin get ninja-forms-webhooks --field=version

Verify Fix Applied:

Verify plugin version is 3.0.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from web server to internal IPs
  • Multiple webhook requests to non-standard destinations
  • Administrator account performing unexpected form submissions

Network Indicators:

  • Web server making requests to internal services (AWS metadata, database APIs, etc.)
  • Outbound requests to unusual ports from web server

SIEM Query:

source="wordpress.log" AND (plugin="ninja-forms-webhooks" OR uri="/wp-admin/admin-ajax.php") AND (action="webhook" OR "nf_webhook")

🔗 References

📤 Share & Export