CVE-2024-13373: CWE-620 Unverified Password Change in scriptsbundle Exertio Framework
CVE-2024-13373 is a high-severity vulnerability in the Exertio Framework WordPress plugin that allows unauthenticated attackers to change arbitrary user passwords, including administrators, via the fl_forgot_pass_new() function. The flaw arises because the plugin fails to properly verify user identity before permitting password updates, enabling privilege escalation and account takeover. Exploitation requires no user interaction but has a high attack complexity due to the need to bypass certain controls. This vulnerability affects all versions up to and including 1. 3. 1 of the plugin. Although no known exploits are currently in the wild, successful attacks could lead to full site compromise, data theft, or site defacement. Organizations using this plugin should urgently apply patches once available or implement workarounds to restrict access to vulnerable endpoints. Countries with significant WordPress usage and large numbers of affected sites, such as the United States, Germany, India, Brazil, and the United Kingdom, are at higher risk. The vulnerability’s CVSS score is 8.
AI Analysis
Technical Summary
CVE-2024-13373 is a vulnerability classified under CWE-620 (Unverified Password Change) found in the Exertio Framework plugin for WordPress, affecting all versions up to 1.3.1. The vulnerability exists because the plugin’s fl_forgot_pass_new() function does not properly verify the identity of users requesting password changes. This flaw allows unauthenticated attackers to arbitrarily change the passwords of any user accounts, including those with administrative privileges. By exploiting this, attackers can escalate privileges and fully compromise the WordPress site. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, though the attack complexity is rated high, indicating some non-trivial conditions must be met. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin. The lack of proper identity validation in password reset functionality is a critical security oversight that can lead to complete site takeover. The vulnerability was reserved in January 2025 and published in March 2025, with no patches currently linked, indicating that mitigation may require vendor updates or manual intervention.
Potential Impact
The impact of CVE-2024-13373 is severe for organizations using the Exertio Framework plugin on WordPress sites. Successful exploitation allows attackers to reset passwords of any user account, including administrators, leading to full site compromise. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code or backdoors, disruption of services, and potential use of the compromised site as a launchpad for further attacks. Given WordPress’s extensive use globally, especially for business, e-commerce, and content management, the vulnerability could affect a large number of organizations. The ability to escalate privileges without authentication increases the risk profile significantly. Additionally, the attack could damage organizational reputation, cause regulatory compliance issues, and incur financial losses. The absence of known exploits in the wild currently provides a window for remediation, but the high severity score underscores the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Exertio Framework plugin and its version. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the password reset endpoint (fl_forgot_pass_new()) via web application firewalls (WAFs), IP whitelisting, or other network controls to prevent unauthenticated requests. Monitoring logs for suspicious password reset attempts targeting this function is critical. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover even if passwords are compromised. Regularly back up WordPress sites and databases to enable recovery in case of compromise. Stay alert for vendor updates or security advisories providing patches or official fixes and apply them promptly. Security teams should also conduct penetration testing focused on password reset mechanisms to detect similar vulnerabilities.
Affected Countries
United States, Germany, India, Brazil, United Kingdom, Canada, Australia, France, Netherlands, Japan
CVE-2024-13373: CWE-620 Unverified Password Change in scriptsbundle Exertio Framework
Description
CVE-2024-13373 is a high-severity vulnerability in the Exertio Framework WordPress plugin that allows unauthenticated attackers to change arbitrary user passwords, including administrators, via the fl_forgot_pass_new() function. The flaw arises because the plugin fails to properly verify user identity before permitting password updates, enabling privilege escalation and account takeover. Exploitation requires no user interaction but has a high attack complexity due to the need to bypass certain controls. This vulnerability affects all versions up to and including 1. 3. 1 of the plugin. Although no known exploits are currently in the wild, successful attacks could lead to full site compromise, data theft, or site defacement. Organizations using this plugin should urgently apply patches once available or implement workarounds to restrict access to vulnerable endpoints. Countries with significant WordPress usage and large numbers of affected sites, such as the United States, Germany, India, Brazil, and the United Kingdom, are at higher risk. The vulnerability’s CVSS score is 8.
AI-Powered Analysis
Technical Analysis
CVE-2024-13373 is a vulnerability classified under CWE-620 (Unverified Password Change) found in the Exertio Framework plugin for WordPress, affecting all versions up to 1.3.1. The vulnerability exists because the plugin’s fl_forgot_pass_new() function does not properly verify the identity of users requesting password changes. This flaw allows unauthenticated attackers to arbitrarily change the passwords of any user accounts, including those with administrative privileges. By exploiting this, attackers can escalate privileges and fully compromise the WordPress site. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, though the attack complexity is rated high, indicating some non-trivial conditions must be met. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin. The lack of proper identity validation in password reset functionality is a critical security oversight that can lead to complete site takeover. The vulnerability was reserved in January 2025 and published in March 2025, with no patches currently linked, indicating that mitigation may require vendor updates or manual intervention.
Potential Impact
The impact of CVE-2024-13373 is severe for organizations using the Exertio Framework plugin on WordPress sites. Successful exploitation allows attackers to reset passwords of any user account, including administrators, leading to full site compromise. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code or backdoors, disruption of services, and potential use of the compromised site as a launchpad for further attacks. Given WordPress’s extensive use globally, especially for business, e-commerce, and content management, the vulnerability could affect a large number of organizations. The ability to escalate privileges without authentication increases the risk profile significantly. Additionally, the attack could damage organizational reputation, cause regulatory compliance issues, and incur financial losses. The absence of known exploits in the wild currently provides a window for remediation, but the high severity score underscores the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the Exertio Framework plugin and its version. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the password reset endpoint (fl_forgot_pass_new()) via web application firewalls (WAFs), IP whitelisting, or other network controls to prevent unauthenticated requests. Monitoring logs for suspicious password reset attempts targeting this function is critical. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover even if passwords are compromised. Regularly back up WordPress sites and databases to enable recovery in case of compromise. Stay alert for vendor updates or security advisories providing patches or official fixes and apply them promptly. Security teams should also conduct penetration testing focused on password reset mechanisms to detect similar vulnerabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-13T20:47:22.299Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e52b7ef31ef0b59e3de
Added to database: 2/25/2026, 9:49:06 PM
Last enriched: 2/26/2026, 1:12:31 AM
Last updated: 2/26/2026, 7:00:21 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.