CVE-2023-0232
📋 TL;DR
The ShopLentor (WooLentor) WordPress plugin before version 2.5.4 contains a PHP Object Injection vulnerability due to unsafe unserialization of user-controlled cookie data. This allows unauthenticated attackers to execute arbitrary code on affected WordPress sites. All WordPress installations using vulnerable versions of this plugin are affected.
💻 Affected Systems
- ShopLentor (WooLentor) WordPress Plugin
📦 What is this software?
Shoplentor by Hasthemes
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete site compromise, data theft, malware installation, or site defacement.
Likely Case
Remote code execution allowing attackers to gain administrative access, install backdoors, or pivot to other systems.
If Mitigated
Attack blocked at WAF level or plugin disabled, preventing exploitation.
🎯 Exploit Status
Exploitation is straightforward as it involves sending specially crafted cookies to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.4
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2852711/woolentor-addons/trunk/includes/helper-function.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ShopLentor' or 'WooLentor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.5.4+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable ShopLentor Plugin
linuxTemporarily disable the vulnerable plugin until patching is possible.
wp plugin deactivate woolentor-addons
WAF Rule to Block Exploitation
allImplement WAF rules to block requests containing serialized PHP objects in cookies.
🧯 If You Can't Patch
- Remove or disable the ShopLentor plugin entirely
- Implement strict WAF rules to block cookie-based PHP object injection attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for ShopLentor/WooLentor version. If version is below 2.5.4, the site is vulnerable.
Check Version:
wp plugin get woolentor-addons --field=version
Verify Fix Applied:
Verify plugin version is 2.5.4 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to WordPress endpoints with serialized data in cookies
- PHP errors related to unserialize() in web server logs
Network Indicators:
- HTTP requests with base64-encoded or serialized PHP objects in cookie headers
SIEM Query:
web_access_logs WHERE uri CONTAINS 'wp-content/plugins/woolentor-addons' AND cookie CONTAINS 'O:'
🔗 References
- https://plugins.trac.wordpress.org/changeset/2852711/woolentor-addons/trunk/includes/helper-function.php
- https://wpscan.com/vulnerability/1885a708-0e8a-4f4c-8e26-069bebe9a518
- https://plugins.trac.wordpress.org/changeset/2852711/woolentor-addons/trunk/includes/helper-function.php
- https://wpscan.com/vulnerability/1885a708-0e8a-4f4c-8e26-069bebe9a518