CVE-2024-12600

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with Shop Manager or higher privileges to perform PHP object injection via the 'frs_woo_product_tabs' parameter in the Custom Product Tabs Lite for WooCommerce WordPress plugin. While no known POP chain exists in the vulnerable plugin itself, if another plugin or theme provides a suitable chain, attackers could delete files, access sensitive data, or execute arbitrary code. Only WordPress sites using this plugin up to version 1.9.0 are affected.

💻 Affected Systems

Products:
  • Custom Product Tabs Lite for WooCommerce WordPress plugin
Versions: All versions up to and including 1.9.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. Exploitation requires authenticated user with Shop Manager role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or site destruction if a suitable POP chain exists from another plugin/theme.

🟠

Likely Case

Limited impact due to requirement for authenticated Shop Manager access and lack of known POP chain in vulnerable plugin - most likely unsuccessful exploitation attempts.

🟢

If Mitigated

No impact if plugin is patched or removed, or if proper access controls prevent unauthorized Shop Manager accounts.

🌐 Internet-Facing: MEDIUM - WordPress sites are typically internet-facing, but exploitation requires authenticated access with elevated privileges.
🏢 Internal Only: LOW - Same authentication requirements apply regardless of network exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with Shop Manager privileges and depends on presence of suitable POP chain from other installed plugins/themes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.9.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3226839/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Custom Product Tabs Lite for WooCommerce'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.9.1+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

WordPress

Temporarily disable or remove the plugin until patched

wp plugin deactivate woocommerce-custom-product-tabs-lite
wp plugin delete woocommerce-custom-product-tabs-lite

Restrict Shop Manager access

all

Review and limit Shop Manager accounts to trusted users only

🧯 If You Can't Patch

  • Remove the plugin entirely from production systems
  • Implement strict access controls and monitor for unauthorized Shop Manager accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Custom Product Tabs Lite for WooCommerce → Version. If version is 1.9.0 or lower, system is vulnerable.

Check Version:

wp plugin get woocommerce-custom-product-tabs-lite --field=version

Verify Fix Applied:

Verify plugin version is 1.9.1 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • POST requests containing 'frs_woo_product_tabs' parameter with serialized data
  • Unusual activity from Shop Manager accounts
  • PHP errors related to unserialize() or object injection

Network Indicators:

  • HTTP POST requests to WordPress admin-ajax.php or admin-post.php with serialized data in parameters

SIEM Query:

source="wordpress.log" AND "frs_woo_product_tabs" AND ("unserialize" OR "O:")

🔗 References

📤 Share & Export