CVE-2024-0399

8.1 HIGH

📋 TL;DR

This SQL injection vulnerability in WooCommerce Customers Manager allows attackers with Subscriber or higher WordPress roles to execute arbitrary SQL commands on the database. It affects WordPress sites using vulnerable versions of the plugin, potentially compromising customer data, site integrity, and administrative access.

💻 Affected Systems

Products:
  • WooCommerce Customers Manager WordPress Plugin
Versions: All versions before 29.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce Customers Manager plugin installed and at least one user with Subscriber role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation to administrator, site defacement, or full system takeover if database permissions allow file system access.

🟠

Likely Case

Unauthorized access to customer data (names, emails, addresses), order history, and potentially sensitive user information stored in the database.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, with database user having minimal necessary permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with at least Subscriber role. SQL injection is well-understood with many available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 29.7 and later

Vendor Advisory: https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WooCommerce Customers Manager. 4. Click 'Update Now' if available. 5. Alternatively, download version 29.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate WooCommerce Customers Manager plugin until patched

wp plugin deactivate woocommerce-customers-manager

Restrict user roles

linux

Temporarily remove Subscriber+ roles or restrict their capabilities

wp user list --role=subscriber --field=ID | xargs wp user set-role {ID} none

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns
  • Restrict database user permissions to SELECT only for the plugin's database user

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins, or run: wp plugin get woocommerce-customers-manager --field=version

Check Version:

wp plugin get woocommerce-customers-manager --field=version

Verify Fix Applied:

Confirm plugin version is 29.7 or higher using same method as checking vulnerable

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by SQL errors
  • Unexpected database connections from web server

Network Indicators:

  • HTTP POST requests with SQL syntax in parameters
  • Unusual traffic patterns to /wp-admin/admin-ajax.php

SIEM Query:

source="web_logs" AND ("UNION SELECT" OR "SELECT * FROM" OR "information_schema") AND uri="*customers-manager*"

🔗 References

📤 Share & Export