CVE-2024-12336

6.5 MEDIUM

📋 TL;DR

This vulnerability in the WC Affiliate WordPress plugin allows authenticated attackers with Subscriber-level access or higher to export sensitive affiliate data without proper authorization. It affects all WordPress sites using this plugin up to version 2.5.3, potentially exposing personally identifiable information (PII) of affiliate users.

💻 Affected Systems

Products:
  • WC Affiliate – A Complete WooCommerce Affiliate Plugin
Versions: All versions up to and including 2.5.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the WC Affiliate plugin installed. Any authenticated user (Subscriber role or higher) can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass exfiltration of all affiliate PII including names, email addresses, payment details, and performance data, leading to regulatory fines, reputational damage, and identity theft risks.

🟠

Likely Case

Targeted extraction of specific affiliate data by malicious users or compromised accounts, resulting in privacy violations and potential affiliate program manipulation.

🟢

If Mitigated

Limited data exposure if strong access controls, monitoring, and least-privilege principles are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated. The vulnerability is publicly documented with code references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wc-affiliate/trunk/src/AJAX.php#L903

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WC Affiliate' and click 'Update Now'. 4. Verify update to version 2.5.4 or higher.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the WC Affiliate plugin until patched

wp plugin deactivate wc-affiliate
wp plugin delete wc-affiliate

Restrict user roles

all

Temporarily restrict Subscriber and other low-privilege accounts from accessing the site

wp user list --role=subscriber --field=ID | xargs wp user delete

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the WordPress instance
  • Enable detailed logging and monitoring for all data export activities

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If WC Affiliate version is 2.5.3 or lower, you are vulnerable.

Check Version:

wp plugin get wc-affiliate --field=version

Verify Fix Applied:

Verify plugin version is 2.5.4 or higher. Test with a Subscriber account that the export_all_data function requires proper admin capabilities.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=export_all_data from non-admin users
  • Multiple data export requests from single user accounts

Network Indicators:

  • Large outbound data transfers from WordPress admin endpoints to unexpected destinations

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data LIKE "%export_all_data%") AND user_role!="administrator"

🔗 References

📤 Share & Export