CVE-2023-51546

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to escalate privileges in the WebToffee WooCommerce PDF plugin, potentially gaining administrative access to WordPress sites. It affects all versions up to 4.2.1 of the plugin. Any WordPress site using this vulnerable plugin is at risk.

💻 Affected Systems

Products:
  • WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels
Versions: All versions up to and including 4.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress sites, allowing them to install malware, steal sensitive data, deface websites, or maintain persistent access.

🟠

Likely Case

Attackers gain elevated privileges to access sensitive customer data, modify orders, or install additional malicious plugins/themes.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized access attempts that can be detected and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of initial access to WordPress, but privilege escalation is straightforward once initial foothold is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/print-invoices-packing-slip-labels-for-woocommerce/wordpress-woocommerce-pdf-invoices-packing-slips-delivery-notes-and-shipping-labels-plugin-4-2-1-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate print-invoices-packing-slip-labels-for-woocommerce

Restrict plugin access

all

Use WordPress role management to restrict who can access plugin settings

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual privilege escalation attempts
  • Deploy web application firewall rules to detect and block privilege escalation patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → WooCommerce PDF Invoices plugin version

Check Version:

wp plugin get print-invoices-packing-slip-labels-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 4.2.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user role changes in WordPress logs
  • Multiple failed privilege escalation attempts
  • Unauthorized access to plugin admin pages

Network Indicators:

  • Unusual POST requests to plugin-specific admin endpoints
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="wordpress" AND (event="user_role_changed" OR event="plugin_admin_access") AND plugin="woocommerce-pdf-invoices"

🔗 References

📤 Share & Export