CVE-2024-13800
Published: 12 February 2025
Description
The ConvertPlus plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cp_dismiss_notice' AJAX endpoint in all versions up to, and including, 3.5.30. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to '1' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.
Security Summary
CVE-2024-13800 is a vulnerability in the ConvertPlus plugin for WordPress, affecting all versions up to and including 3.5.30. It stems from a missing capability check on the 'cp_dismiss_notice' AJAX endpoint, enabling unauthorized modification of data. This flaw, classified under CWE-862 (Missing Authorization), has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), highlighting high integrity and availability impacts with network accessibility and low attack complexity.
Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability remotely without user interaction. By sending crafted requests to the AJAX endpoint, they can update WordPress option values to '1', potentially triggering site errors that result in denial of service for legitimate users. Additionally, this could enable certain features, such as registration, by setting relevant options to true.
Advisories from sources like Wordfence detail the issue, with references available at https://www.wordfence.com/threat-intel/vulnerabilities/id/580ae2da-76f2-42b3-a26c-62ad8d6d1686?source=cve and the plugin's product page at https://www.convertplug.com/plus/product/convertplug/ for further guidance on mitigation.
Details
- CWE(s)