CVE-2021-4337

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with subscriber-level permissions or higher to bypass authorization checks in 16 XforWooCommerce WordPress plugins. Attackers can read, edit, or delete WordPress/plugin settings and list all users on affected websites. The vulnerability affects WordPress sites using any of the listed plugins below their patched versions.

💻 Affected Systems

Products:
  • Product Filter for WooCommerce
  • Improved Product Options for WooCommerce
  • Improved Sale Badges for WooCommerce
  • Share, Print and PDF Products for WooCommerce
  • Product Loops for WooCommerce
  • XforWooCommerce
  • Package Quantity Discount
  • Price Commander for WooCommerce
  • Comment and Review Spam Control for WooCommerce
  • Add Product Tabs for WooCommerce
  • Autopilot SEO for WooCommerce
  • Floating Cart
  • Live Search for WooCommerce
  • Bulk Add to Cart for WooCommerce
  • Live Product Editor for WooCommerce
  • Warranties and Returns for WooCommerce
Versions: Versions below: Product Filter for WooCommerce 8.2.0, Improved Product Options for WooCommerce 5.3.0, Improved Sale Badges for WooCommerce 4.4.0, Share, Print and PDF Products for WooCommerce 2.8.0, Product Loops for WooCommerce 1.7.0, XforWooCommerce 1.7.0, Package Quantity Discount 1.2.0, Price Commander for WooCommerce 1.3.0, Comment and Review Spam Control for WooCommerce 1.5.0, Add Product Tabs for WooCommerce 1.5.0, Autopilot SEO for WooCommerce 1.6.0, Floating Cart 1.3.0, Live Search for WooCommerce 2.1.0, Bulk Add to Cart for WooCommerce 1.3.0, Live Product Editor for WooCommerce 4.7.0, Warranties and Returns for WooCommerce 5.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using affected plugin versions are vulnerable. The vulnerability requires authenticated access but works with subscriber-level permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain administrative privileges, modify critical settings, steal user data, deface the site, or install backdoors for persistent access.

🟠

Likely Case

Attackers with subscriber accounts modify plugin configurations, disrupt e-commerce functionality, access user information, or alter site settings to enable further attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized configuration changes that can be detected and reverted before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker obtains subscriber-level credentials. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Product Filter for WooCommerce 8.2.0+, Improved Product Options for WooCommerce 5.3.0+, Improved Sale Badges for WooCommerce 4.4.0+, Share, Print and PDF Products for WooCommerce 2.8.0+, Product Loops for WooCommerce 1.7.0+, XforWooCommerce 1.7.0+, Package Quantity Discount 1.2.0+, Price Commander for WooCommerce 1.3.0+, Comment and Review Spam Control for WooCommerce 1.5.0+, Add Product Tabs for WooCommerce 1.5.0+, Autopilot SEO for WooCommerce 1.6.0+, Floating Cart 1.3.0+, Live Search for WooCommerce 2.1.0+, Bulk Add to Cart for WooCommerce 1.3.0+, Live Product Editor for WooCommerce 4.7.0+, Warranties and Returns for WooCommerce 5.3.0+

Vendor Advisory: https://xforwoocommerce.com/blog/change-log/xforwoocommerce-1-7-0/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. For each affected plugin, check current version. 4. If below patched version, update via WordPress update system or download from vendor. 5. Verify all plugins are updated to patched versions.

🔧 Temporary Workarounds

Disable vulnerable plugins

all

Temporarily disable affected plugins until patches can be applied

wp plugin deactivate [plugin-slug]

Restrict user registration

all

Disable new user registration to prevent attackers from creating subscriber accounts

Settings > General > Membership: Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious user activity
  • Deploy web application firewall with rules to block unauthorized AJAX requests to wp_ajax_svx_ajax_factory

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for affected plugin versions

Check Version:

wp plugin list --fields=name,version

Verify Fix Applied:

Verify all affected plugins show version numbers at or above patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to wp_ajax_svx_ajax_factory from non-admin users
  • Unexpected configuration changes in WordPress settings or plugin options
  • User enumeration attempts from unauthorized accounts

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=svx_ajax_factory from non-admin IPs

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "action=svx_ajax_factory") AND user_role!="administrator"

🔗 References

📤 Share & Export