CVE-2024-13375
Published: 18 January 2025
Summary
CVE-2024-13375 is a critical-severity Unverified Password Change (CWE-620) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, ranked in the top 6.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-2 (Account Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Limits permitted actions without identification or authentication, directly preventing unauthorized password updates via the adifier_recover() function lacking identity validation.
Requires verification of individual identity before distributing or changing authenticators like passwords, addressing the failure to validate user identity in the recovery function.
Mandates authorized processes for account modifications including password changes, mitigating unauthenticated alterations to arbitrary user accounts.
NVD Description
The Adifier System plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.1.7. This is due to the plugin not properly validating a user's identity prior to updating their details like…
more
password through the adifier_recover() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Deeper analysisAI
CVE-2024-13375 is a privilege escalation vulnerability affecting the Adifier System plugin for WordPress in all versions up to and including 3.1.7. The issue stems from the plugin's adifier_recover() function failing to properly validate a user's identity before allowing updates to account details, such as passwords. This flaw enables account takeover by permitting unauthorized changes to user credentials.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By targeting the recovery function, attackers can reset passwords for arbitrary users, including administrators, thereby gaining full access to those accounts and potentially compromising the entire WordPress site.
Advisories are available from sources including Wordfence threat intelligence and the Adifier theme page on ThemeForest, which provide further details on the vulnerability. No specific patch or mitigation steps are detailed in the core CVE information.
Details
- CWE(s)