CVE-2024-13511
📋 TL;DR
This vulnerability allows attackers to reset plugin settings without proper authentication in Variation Swatches for WooCommerce. It affects WordPress sites using this plugin, potentially disrupting e-commerce functionality. The issue stems from improper nonce verification in the settings reset feature.
💻 Affected Systems
- Variation Swatches for WooCommerce WordPress plugin
📦 What is this software?
Variation Swatches For Woocommerce by Variation Swatches For Woocommerce Project
View all CVEs affecting Variation Swatches For Woocommerce →
⚠️ Risk & Real-World Impact
Worst Case
Malicious actor resets all plugin settings, disrupting product variation displays and potentially causing e-commerce functionality issues or requiring manual reconfiguration.
Likely Case
Unauthorized user resets plugin settings, causing temporary disruption to product display functionality until settings are restored.
If Mitigated
No impact if proper access controls and nonce verification are implemented.
🎯 Exploit Status
Exploitation requires knowledge of the vulnerable endpoint and ability to craft specific HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.3
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3226822/th-variation-swatches/trunk/inc/thvs-settings.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'Variation Swatches for WooCommerce'
4. Click 'Update Now' if available
5. If not, download version 1.3.3+ from WordPress.org and manually update
🔧 Temporary Workarounds
Disable plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate th-variation-swatches
Restrict admin access
linuxLimit access to WordPress admin panel to trusted IPs only
# Add to .htaccess for Apache:
Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24
Allow from 10.0.0.0/8
# Add to nginx config:
location /wp-admin {
allow 192.168.1.0/24;
allow 10.0.0.0/8;
deny all;
}
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to the vulnerable endpoint
- Monitor and alert on unauthorized settings reset attempts in WordPress logs
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin > Plugins > Variation Swatches for WooCommerce. If version is between 1.0.8 and 1.3.2 inclusive, you are vulnerable.
Check Version:
wp plugin get th-variation-swatches --field=version
Verify Fix Applied:
Verify plugin version is 1.3.3 or higher after update. Test settings reset functionality requires proper authentication.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-admin/admin.php?page=th-variation-swatches&action=reset without proper nonce
- Unauthorized settings reset events in WordPress audit logs
Network Indicators:
- HTTP requests containing 'action=reset' parameter targeting the plugin admin page
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin.php" AND query_string="*page=th-variation-swatches*action=reset*")
🔗 References
- https://plugins.trac.wordpress.org/browser/th-variation-swatches/tags/1.3.1/inc/thvs-settings.php
- https://plugins.trac.wordpress.org/changeset/3226822/th-variation-swatches/trunk/inc/thvs-settings.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6c43b9b4-4394-428a-b381-d6a776fcd130?source=cve