CVE-2023-0865

8.8 HIGH

📋 TL;DR

This vulnerability in the WooCommerce Multiple Customer Addresses & Shipping WordPress plugin allows any authenticated user (even low-privilege subscribers) to access, modify, duplicate, or delete other users' addresses. It affects WordPress sites using vulnerable versions of this plugin, potentially exposing customer data and enabling unauthorized changes.

💻 Affected Systems

Products:
  • WooCommerce Multiple Customer Addresses & Shipping WordPress plugin
Versions: All versions before 21.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Any authenticated user can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access, modify, or delete all customer address data, potentially enabling identity theft, fraud, or further attacks by gathering sensitive information about users.

🟠

Likely Case

Authenticated attackers accessing and modifying other users' addresses, potentially disrupting orders, harvesting personal data, or causing service issues.

🟢

If Mitigated

Limited to authenticated users only, with proper access controls preventing unauthorized data access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public proof-of-concept exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.7 and later

Vendor Advisory: https://wpscan.com/vulnerability/e39c0171-ed4a-4143-9a31-c407e3555eec

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Multiple Customer Addresses & Shipping'. 4. Click 'Update Now' if available, or manually update to version 21.7+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched

wp plugin deactivate woocommerce-multiple-addresses

Restrict user registration

all

Temporarily disable new user registration to limit attack surface

wp option update users_can_register 0

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious address manipulation requests
  • Enable detailed logging of all address-related operations and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins. If version is below 21.7, you are vulnerable.

Check Version:

wp plugin get woocommerce-multiple-addresses --field=version

Verify Fix Applied:

Confirm plugin version is 21.7 or higher in WordPress admin panel. Test with low-privilege user attempting to access other users' addresses.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for address operations
  • User accessing/modifying addresses not belonging to them
  • Unusual address modification patterns from low-privilege accounts

Network Indicators:

  • POST requests to address endpoints from unauthorized users
  • Unusual API calls to user address management functions

SIEM Query:

source="wordpress.log" AND ("add_address" OR "update_address" OR "delete_address") AND user_role="subscriber"

🔗 References

📤 Share & Export