Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13373: CWE-620 Unverified Password Change in scriptsbundle Exertio Framework

0
High
VulnerabilityCVE-2024-13373cvecve-2024-13373cwe-620
Published: Sat Mar 01 2025 (03/01/2025, 06:39:27 UTC)
Source: CVE Database V5
Vendor/Project: scriptsbundle
Product: Exertio Framework

Description

CVE-2024-13373 is a high-severity vulnerability in the Exertio Framework WordPress plugin that allows unauthenticated attackers to change arbitrary user passwords, including administrators, via the fl_forgot_pass_new() function. The flaw arises because the plugin fails to properly verify user identity before permitting password updates, enabling privilege escalation and account takeover. Exploitation requires no user interaction but has a high attack complexity due to the need to bypass certain controls. This vulnerability affects all versions up to and including 1. 3. 1 of the plugin. Although no known exploits are currently in the wild, successful attacks could lead to full site compromise, data theft, or site defacement. Organizations using this plugin should urgently apply patches once available or implement workarounds to restrict access to vulnerable endpoints. Countries with significant WordPress usage and large numbers of affected sites, such as the United States, Germany, India, Brazil, and the United Kingdom, are at higher risk. The vulnerability’s CVSS score is 8.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:12:31 UTC

Technical Analysis

CVE-2024-13373 is a vulnerability classified under CWE-620 (Unverified Password Change) found in the Exertio Framework plugin for WordPress, affecting all versions up to 1.3.1. The vulnerability exists because the plugin’s fl_forgot_pass_new() function does not properly verify the identity of users requesting password changes. This flaw allows unauthenticated attackers to arbitrarily change the passwords of any user accounts, including those with administrative privileges. By exploiting this, attackers can escalate privileges and fully compromise the WordPress site. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, though the attack complexity is rated high, indicating some non-trivial conditions must be met. The CVSS v3.1 base score is 8.1, reflecting high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of WordPress and the plugin. The lack of proper identity validation in password reset functionality is a critical security oversight that can lead to complete site takeover. The vulnerability was reserved in January 2025 and published in March 2025, with no patches currently linked, indicating that mitigation may require vendor updates or manual intervention.

Potential Impact

The impact of CVE-2024-13373 is severe for organizations using the Exertio Framework plugin on WordPress sites. Successful exploitation allows attackers to reset passwords of any user account, including administrators, leading to full site compromise. This can result in unauthorized access to sensitive data, defacement, insertion of malicious code or backdoors, disruption of services, and potential use of the compromised site as a launchpad for further attacks. Given WordPress’s extensive use globally, especially for business, e-commerce, and content management, the vulnerability could affect a large number of organizations. The ability to escalate privileges without authentication increases the risk profile significantly. Additionally, the attack could damage organizational reputation, cause regulatory compliance issues, and incur financial losses. The absence of known exploits in the wild currently provides a window for remediation, but the high severity score underscores the urgency for mitigation.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Exertio Framework plugin and its version. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate the attack surface. If removal is not feasible, restrict access to the password reset endpoint (fl_forgot_pass_new()) via web application firewalls (WAFs), IP whitelisting, or other network controls to prevent unauthenticated requests. Monitoring logs for suspicious password reset attempts targeting this function is critical. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover even if passwords are compromised. Regularly back up WordPress sites and databases to enable recovery in case of compromise. Stay alert for vendor updates or security advisories providing patches or official fixes and apply them promptly. Security teams should also conduct penetration testing focused on password reset mechanisms to detect similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T20:47:22.299Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e52b7ef31ef0b59e3de

Added to database: 2/25/2026, 9:49:06 PM

Last enriched: 2/26/2026, 1:12:31 AM

Last updated: 2/26/2026, 7:00:21 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats