CVE-2025-11370

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to modify pop-up display settings in WordPress sites using the Depicter plugin. All WordPress installations with Depicter plugin versions up to 4.0.7 are affected. Attackers can change how pop-ups appear without needing any login credentials.

💻 Affected Systems

Products:
  • Popup and Slider Builder by Depicter WordPress plugin
Versions: All versions up to and including 4.0.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify pop-ups to display malicious content, redirect users to phishing sites, or hide legitimate content while showing deceptive messages.

🟠

Likely Case

Attackers will modify pop-up settings to display unwanted advertisements, redirect users to affiliate sites, or show misleading content for click fraud.

🟢

If Mitigated

With proper monitoring, changes would be detected quickly and could be reverted, but some users might still see malicious content before detection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists showing how to exploit this vulnerability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3428118/depicter/trunk/app/routes/ajax.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Popup and Slider Builder by Depicter'. 4. Click 'Update Now' if available. 5. If no update shows, download version 4.0.8+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Depicter Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate depicter

Restrict AJAX Endpoint Access

linux

Block access to the vulnerable AJAX endpoint via web server configuration

# Apache: <LocationMatch "\/wp-content\/plugins\/depicter.*ajax">\n    Order deny,allow\n    Deny from all\n</LocationMatch>
# Nginx: location ~* \/wp-content\/plugins\/depicter.*ajax {\n    deny all;\n}

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to /wp-content/plugins/depicter/*ajax endpoints
  • Monitor WordPress logs for unauthorized POST requests to Depicter AJAX endpoints and alert on suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Depicter version. If version is 4.0.7 or lower, you are vulnerable.

Check Version:

wp plugin get depicter --field=version

Verify Fix Applied:

After updating, verify Depicter plugin shows version 4.0.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-content/plugins/depicter/*ajax endpoints from unauthenticated users
  • Multiple rapid requests to Depicter AJAX endpoints

Network Indicators:

  • Unusual POST requests to WordPress AJAX endpoints without authentication headers
  • Traffic patterns showing exploitation attempts against /wp-admin/admin-ajax.php with depicter parameters

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "depicter" AND NOT user_agent CONTAINS "wp-admin")

🔗 References

📤 Share & Export