CVE-2024-13528

7.5 HIGH

📋 TL;DR

The Customer Email Verification for WooCommerce WordPress plugin has an authentication bypass vulnerability that allows authenticated attackers with Contributor-level access or higher to generate verification links for any unverified user account and log into that account. This affects all versions up to 2.9.5 when the 'Fine tune placement' option is enabled in plugin settings.

💻 Affected Systems

Products:
  • Customer Email Verification for WooCommerce WordPress plugin
Versions: All versions up to and including 2.9.5
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Requires 'Fine tune placement' option to be enabled in plugin settings for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, potentially compromising customer data, payment information, and allowing complete site takeover.

🟠

Likely Case

Attackers gain access to customer accounts to steal personal information, make fraudulent purchases, or access order history.

🟢

If Mitigated

Limited impact if strong access controls, monitoring, and regular patching are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access (Contributor role or higher) and specific plugin configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3238136/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Customer Email Verification for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.9.6+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Fine Tune Placement

all

Disable the vulnerable plugin setting that enables exploitation

Remove Contributor Access

all

Temporarily restrict Contributor-level user access until patching

🧯 If You Can't Patch

  • Disable the Customer Email Verification for WooCommerce plugin entirely
  • Implement strict user role management and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Customer Email Verification for WooCommerce version. If version is 2.9.5 or earlier and 'Fine tune placement' is enabled, you are vulnerable.

Check Version:

wp plugin list --name='Customer Email Verification for WooCommerce' --field=version

Verify Fix Applied:

Verify plugin version is 2.9.6 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns from Contributor-level users
  • Multiple account verification requests from single IP
  • User account logins from unexpected locations

Network Indicators:

  • HTTP POST requests to verification endpoints with manipulated parameters

SIEM Query:

source="wordpress" AND (event="user_login" OR event="account_verification") AND user_role="contributor" AND count>5

🔗 References

📤 Share & Export