CVE-2024-0683

7.3 HIGH

📋 TL;DR

The Bulgarisation for WooCommerce WordPress plugin has missing capability checks that allow unauthorized users to generate and delete labels. This affects all WordPress sites using plugin versions up to 3.0.14. Both unauthenticated attackers and authenticated users with subscriber-level access or higher can exploit this vulnerability.

💻 Affected Systems

Products:
  • Bulgarisation for WooCommerce WordPress plugin
Versions: All versions up to and including 3.0.14
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the Bulgarisation plugin installed. All configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical shipping labels, disrupt e-commerce operations, generate fraudulent labels, and potentially escalate privileges through plugin manipulation.

🟠

Likely Case

Unauthorized label generation/deletion causing operational disruption, data integrity issues, and potential financial impact from shipping problems.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though plugin functionality remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to vulnerable endpoints can trigger the missing capability checks. No special tools or knowledge required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.15 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034198%40bulgarisation-for-woocommerce&new=3034198%40bulgarisation-for-woocommerce&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Bulgarisation for WooCommerce. 4. Click 'Update Now' if available. 5. If not, download version 3.0.15+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate bulgarisation-for-woocommerce

Access Restriction

all

Restrict access to WordPress admin and plugin endpoints via web application firewall

🧯 If You Can't Patch

  • Disable the Bulgarisation for WooCommerce plugin immediately
  • Implement strict network access controls to WordPress admin interfaces

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 3.0.14 or lower, you are vulnerable.

Check Version:

wp plugin get bulgarisation-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 3.0.15 or higher. Test label generation/deletion functions with non-admin accounts to confirm proper access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with bulgarisation-related actions
  • Label generation/deletion events from non-admin users
  • Multiple failed capability check attempts

Network Indicators:

  • Unusual traffic to WordPress admin-ajax endpoints from unauthenticated sources
  • Bursts of label-related API calls

SIEM Query:

source="wordpress.log" AND ("action=bulgarisation" OR "plugin=bulgarisation") AND (user_role="subscriber" OR user_id="0")

🔗 References

📤 Share & Export