CVE-2023-3459

7.2 HIGH

📋 TL;DR

This vulnerability in the Export and Import Users and Customers WordPress plugin allows authenticated attackers with shop manager permissions to modify user data without proper authorization. Specifically, they can change passwords, potentially enabling account takeover of administrators. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Export and Import Users and Customers WordPress plugin
Versions: Up to and including 2.4.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the plugin installed and at least one user with shop manager role.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access, leading to complete site compromise, data theft, malware injection, or defacement.

🟠

Likely Case

Shop managers escalate privileges to administrator, gaining unauthorized control over user accounts and site functions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized password changes detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated shop manager access; proof-of-concept details are publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2938705/users-customers-import-export-for-wp-woocommerce

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Export and Import Users and Customers'. 4. Click 'Update Now' if available, or manually update to version 2.4.2 or later.

🔧 Temporary Workarounds

Disable the plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate users-customers-import-export-for-wp-woocommerce

Restrict shop manager roles

all

Limit shop manager permissions or remove unnecessary users with this role.

🧯 If You Can't Patch

  • Monitor user account changes and audit logs for suspicious password resets.
  • Implement network segmentation to isolate the WordPress instance and reduce attack surface.

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins; if version is 2.4.1 or earlier, it is vulnerable.

Check Version:

wp plugin get users-customers-import-export-for-wp-woocommerce --field=version

Verify Fix Applied:

Confirm plugin version is 2.4.2 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password change events in WordPress logs
  • AJAX requests to 'hf_update_customer' action from shop manager accounts

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action parameter 'hf_update_customer'

SIEM Query:

source="wordpress.log" AND "password changed" AND user_role="shop_manager"

🔗 References

📤 Share & Export