CVE-2023-33330

8.5 HIGH

📋 TL;DR

This SQL injection vulnerability in WooCommerce AutomateWoo allows attackers to execute arbitrary SQL commands through the plugin. It affects WordPress sites using AutomateWoo versions up to 4.9.50, potentially compromising database integrity and exposing sensitive data.

💻 Affected Systems

Products:
  • WooCommerce AutomateWoo (formerly WooCommerce Follow-up Emails)
Versions: All versions up to and including 4.9.50
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and AutomateWoo plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential privilege escalation to full system access.

🟠

Likely Case

Unauthorized data access including customer information, order details, and potentially administrative credentials.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and accessible via web interfaces.
🏢 Internal Only: LOW - This is primarily a web application vulnerability requiring external access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are commonly exploited; authentication requirements may vary based on specific vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.51 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woocommerce-follow-up-emails/wordpress-woocommerce-follow-up-emails-plugin-4-9-50-follow-up-emails-manager-sql-injection-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'AutomateWoo' or 'WooCommerce Follow-up Emails'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable AutomateWoo plugin until patched

wp plugin deactivate automatewoo

Web Application Firewall rules

all

Implement WAF rules to block SQL injection patterns targeting AutomateWoo endpoints

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom code
  • Restrict database user permissions to minimum required for application functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for AutomateWoo version ≤4.9.50

Check Version:

wp plugin get automatewoo --field=version

Verify Fix Applied:

Confirm AutomateWoo version is 4.9.51 or higher in WordPress plugins list

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or unusual parameter patterns in web server logs

Network Indicators:

  • HTTP requests with SQL injection patterns to AutomateWoo endpoints
  • Unusual database connection patterns from web server

SIEM Query:

source="web_server" AND (url="*automatewoo*" OR url="*follow-up-emails*") AND (param="*' OR *" OR param="*;--*" OR param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*UPDATE*")

🔗 References

📤 Share & Export