CVE-2024-10567

7.5 HIGH

📋 TL;DR

The TI WooCommerce Wishlist plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to create pages, modify plugin settings, and update limited options. This affects all WordPress sites using the plugin up to version 2.9.1. Attackers can exploit this without any authentication or special privileges.

💻 Affected Systems

Products:
  • TI WooCommerce Wishlist Plugin for WordPress
Versions: All versions up to and including 2.9.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create malicious pages that serve malware or phishing content, modify plugin settings to disrupt functionality, and potentially chain with other vulnerabilities for further compromise.

🟠

Likely Case

Attackers create spam pages or modify wishlist functionality to disrupt user experience or redirect users to malicious sites.

🟢

If Mitigated

With proper web application firewalls and monitoring, unauthorized changes would be detected and blocked before causing significant damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a simple exploitation path via the 'wizard' function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3199516/ti-woocommerce-wishlist

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'TI WooCommerce Wishlist' and click 'Update Now'. 4. Verify the plugin version is 2.9.2 or higher.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily deactivate the TI WooCommerce Wishlist plugin until patched

wp plugin deactivate ti-woocommerce-wishlist

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) rule to block requests to the vulnerable 'wizard' endpoint
  • Restrict access to WordPress admin functions and monitor for unauthorized page creation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > TI WooCommerce Wishlist version. If version is 2.9.1 or lower, you are vulnerable.

Check Version:

wp plugin get ti-woocommerce-wishlist --field=version

Verify Fix Applied:

After updating, confirm the plugin version shows 2.9.2 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with action parameter containing 'wizard'
  • Sudden creation of new pages with unusual content

Network Indicators:

  • Unusual traffic patterns to WordPress admin-ajax endpoints from unauthenticated sources

SIEM Query:

source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" AND post_data="action=*wizard*")

🔗 References

📤 Share & Export