CVE-2024-10625

9.8 CRITICAL

📋 TL;DR

The WooCommerce Support Ticket System WordPress plugin has an arbitrary file deletion vulnerability that allows unauthenticated attackers to delete any file on the server. This affects all versions up to 17.7 and can lead to complete site compromise when critical files like wp-config.php are deleted. WordPress sites using this plugin are vulnerable.

💻 Affected Systems

Products:
  • WooCommerce Support Ticket System WordPress Plugin
Versions: All versions up to and including 17.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on WordPress with WooCommerce.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover via remote code execution after deleting wp-config.php or other critical files, leading to data theft, defacement, or ransomware deployment.

🟠

Likely Case

Site disruption or downtime from deletion of important files, potentially requiring full restoration from backups.

🟢

If Mitigated

Limited impact if proper file permissions and web application firewalls block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill due to public proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 17.8 or later

Vendor Advisory: https://codecanyon.net/item/woocommerce-support-ticket-system/17930050

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Support Ticket System'. 4. Click 'Update Now' if available. 5. If no update appears, download version 17.8+ from CodeCanyon and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate woocommerce-support-ticket-system

Web Application Firewall Rule

all

Block requests to the vulnerable delete_tmp_uploaded_file() function endpoint.

# Add rule to block POST requests to */wp-admin/admin-ajax.php with action=delete_tmp_uploaded_file

🧯 If You Can't Patch

  • Implement strict file permissions (e.g., 644 for files, 755 for directories) to limit deletion capabilities.
  • Deploy a web application firewall (WAF) with rules to block arbitrary file deletion attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'WooCommerce Support Ticket System' version 17.7 or lower.

Check Version:

wp plugin get woocommerce-support-ticket-system --field=version

Verify Fix Applied:

Confirm plugin version is 17.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'action=delete_tmp_uploaded_file' parameter
  • File deletion events in web server logs for unexpected paths

Network Indicators:

  • HTTP POST requests containing file paths in parameters targeting the vulnerable endpoint

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="delete_tmp_uploaded_file"

🔗 References

📤 Share & Export