Skip to main content

CVE-2024-13420: CWE-94 Improper Control of Generation of Code ('Code Injection') in G5Theme Benaa Framework

Medium
VulnerabilityCVE-2024-13420cvecve-2024-13420cwe-94
Published: Fri May 02 2025 (05/02/2025, 03:21:19 UTC)
Source: CVE
Vendor/Project: G5Theme
Product: Benaa Framework

Description

Multiple plugins and/or themes for WordPress are vulnerable to unauthorized access due to a missing capability check on several AJAX actions like 'gsf_reset_section_options', 'gsf_reset_section_options', 'gsf_create_preset_options' and more in various versions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset and modify some of the plugin/theme settings. This issue was escalated to Envato over two months from the date of this disclosure and the issues, while partially patched, are still vulnerable.

AI-Powered Analysis

AILast updated: 06/26/2025, 00:28:35 UTC

Technical Analysis

CVE-2024-13420 is a medium-severity vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as Code Injection) affecting the G5Theme Benaa Framework, a WordPress theme framework used by multiple plugins and themes. The vulnerability arises due to missing capability checks on several AJAX actions such as 'gsf_reset_section_options' and 'gsf_create_preset_options'. These AJAX endpoints lack proper authorization validation, allowing authenticated users with as low as Subscriber-level privileges to invoke these actions. Consequently, such users can reset or modify certain plugin or theme settings without proper permissions. Although the vulnerability does not allow unauthenticated attackers to exploit it, the fact that Subscriber-level users can manipulate settings poses a significant risk, especially in environments where user roles are not tightly controlled. The vulnerability has been reported to Envato and partially patched; however, some versions remain vulnerable, indicating incomplete remediation. The CVSS 3.1 base score is 4.3, reflecting a medium severity with an attack vector over the network, low attack complexity, requiring privileges, no user interaction, and impacting integrity but not confidentiality or availability. No known exploits are currently detected in the wild. The vulnerability affects all versions of the Benaa Framework, indicating a broad attack surface for sites using this framework. Given the nature of WordPress as a widely used CMS in Europe, this vulnerability could be leveraged to alter site configurations, potentially leading to further exploitation or site misconfigurations.

Potential Impact

For European organizations, especially those relying on WordPress sites using the G5Theme Benaa Framework, this vulnerability can lead to unauthorized modification of site settings by low-privileged users. This can compromise the integrity of the website, potentially allowing attackers to alter site behavior, disable security features, or prepare the environment for further attacks such as privilege escalation or code injection. Although the vulnerability does not directly impact confidentiality or availability, the integrity compromise can indirectly lead to data exposure or service disruption if attackers leverage altered settings to deploy malicious payloads or backdoors. Organizations with multi-user WordPress environments, such as media companies, e-commerce platforms, or public sector websites, are particularly at risk if user role assignments are not strictly managed. The partial patching status increases the risk of exploitation, especially in environments where updates are delayed. Additionally, the lack of user interaction requirement and network accessibility of the AJAX endpoints make exploitation feasible remotely by authenticated users, increasing the threat surface.

Mitigation Recommendations

1. Immediately audit all WordPress sites using the G5Theme Benaa Framework to identify affected versions. 2. Restrict Subscriber-level and other low-privileged user accounts from accessing administrative or sensitive areas of the site. 3. Apply any available patches or updates from G5Theme or Envato as soon as they are released; monitor vendor channels for complete fixes. 4. Implement Web Application Firewall (WAF) rules to monitor and block unauthorized AJAX requests targeting 'gsf_reset_section_options', 'gsf_create_preset_options', and similar endpoints. 5. Harden WordPress user roles and permissions, removing unnecessary accounts or elevating privileges only when strictly necessary. 6. Conduct regular security audits and penetration testing focusing on AJAX endpoints and capability checks. 7. Consider temporarily disabling or replacing the Benaa Framework-based themes/plugins if patching is delayed. 8. Monitor logs for suspicious AJAX activity indicative of exploitation attempts. 9. Educate site administrators on the risks of granting Subscriber-level users unnecessary access and the importance of timely patching. These steps go beyond generic advice by focusing on role management, targeted WAF rules, and proactive monitoring specific to the vulnerability's attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-15T18:34:34.794Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec0bb

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/26/2025, 12:28:35 AM

Last updated: 7/31/2025, 6:28:27 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats