CVE-2016-10922

9.8 CRITICAL

📋 TL;DR

This vulnerability in the WooCommerce Store Toolkit WordPress plugin allows attackers to escalate privileges, potentially gaining administrative access to WordPress sites. It affects WordPress sites running vulnerable versions of the plugin. Attackers could take full control of affected websites.

💻 Affected Systems

Products:
  • WooCommerce Store Toolkit WordPress Plugin
Versions: All versions before 1.5.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce Store Toolkit plugin installed. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrative privileges, allowing data theft, defacement, malware injection, and further network compromise.

🟠

Likely Case

Unauthorized administrative access leading to data manipulation, plugin/theme installation, and backdoor persistence.

🟢

If Mitigated

Limited impact if proper access controls, monitoring, and least privilege principles are enforced.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing and this vulnerability allows unauthenticated exploitation.
🏢 Internal Only: MEDIUM - Internal WordPress installations could still be compromised through phishing or insider threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability. Exploit code is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.7 and later

Vendor Advisory: https://wordpress.org/plugins/woocommerce-store-toolkit/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WooCommerce Store Toolkit'. 4. Click 'Update Now' if available. 5. If no update button, download version 1.5.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate woocommerce-store-toolkit

Access Restriction

all

Restrict access to WordPress admin paths via web application firewall

🧯 If You Can't Patch

  • Remove the plugin completely if not essential
  • Implement strict network segmentation and monitor for suspicious admin activity

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins

Check Version:

wp plugin get woocommerce-store-toolkit --field=version

Verify Fix Applied:

Confirm plugin version is 1.5.7 or higher and test privilege escalation attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user creation/modification
  • Multiple failed login attempts followed by successful admin access
  • Plugin activation/deactivation logs for woocommerce-store-toolkit

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with suspicious parameters
  • Unusual traffic patterns to WordPress admin endpoints

SIEM Query:

source="wordpress.log" AND ("woocommerce-store-toolkit" OR "admin-ajax.php") AND ("user_role_changed" OR "new_admin_user")

🔗 References

📤 Share & Export