CVE-2023-33318
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites using vulnerable versions of the AutomateWoo plugin for WooCommerce. Attackers can upload malicious files like PHP shells to gain remote code execution. All WordPress sites with AutomateWoo versions up to 4.9.40 are affected.
💻 Affected Systems
- WordPress AutomateWoo plugin (formerly WooCommerce Follow-up Emails)
📦 What is this software?
Automatewoo by Woocommerce
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or website defacement.
Likely Case
Remote code execution allowing attackers to install backdoors, steal sensitive data, or pivot to other systems.
If Mitigated
File upload attempts blocked, but attackers may still attempt exploitation.
🎯 Exploit Status
Exploitation is trivial with publicly available proof-of-concept code. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.9.41 and later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find AutomateWoo. 4. Click 'Update Now' if available. 5. If no update shows, manually download version 4.9.41+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable AutomateWoo plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate automatewoo
Restrict file uploads via .htaccess
linuxBlock PHP file uploads to WordPress uploads directory
Add to .htaccess in wp-content/uploads: <Files *.php> deny from all </Files>
🧯 If You Can't Patch
- Disable the AutomateWoo plugin immediately
- Implement web application firewall rules to block file uploads to vulnerable endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → AutomateWoo version. If version is 4.9.40 or lower, you are vulnerable.
Check Version:
wp plugin get automatewoo --field=version
Verify Fix Applied:
Verify AutomateWoo version is 4.9.41 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /wp-content/uploads/ directory
- POST requests to AutomateWoo endpoints with file parameters
- PHP file creation in uploads directory
Network Indicators:
- HTTP POST requests with file uploads to AutomateWoo endpoints
- Unexpected outbound connections from web server after file upload
SIEM Query:
source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "automatewoo") AND method="POST" AND (params CONTAINS "file" OR params CONTAINS "upload")
🔗 References
- https://patchstack.com/database/vulnerability/woocommerce-follow-up-emails/wordpress-woocommerce-follow-up-emails-plugin-4-9-40-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/woocommerce-follow-up-emails/wordpress-woocommerce-follow-up-emails-plugin-4-9-40-arbitrary-file-upload-vulnerability?_s_id=cve