CVE-2024-13558

7.5 HIGH

📋 TL;DR

The NP Quote Request for WooCommerce WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to read quote request content without proper authorization. This affects all WordPress sites using the plugin up to version 1.9.179. Attackers can access sensitive customer quote data that should be protected.

💻 Affected Systems

Products:
  • NP Quote Request for WooCommerce WordPress plugin
Versions: All versions up to and including 1.9.179
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access all quote requests containing sensitive customer information, pricing data, and business communications, potentially leading to data breach, competitive intelligence gathering, or follow-on attacks using stolen information.

🟠

Likely Case

Unauthenticated attackers reading quote request content containing customer names, email addresses, product inquiries, and potentially pricing information, violating data privacy and confidentiality.

🟢

If Mitigated

If proper access controls and input validation are implemented, only authorized users can access quote requests, preventing unauthorized data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and appears to be straightforward to exploit based on the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.9.179

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3256816/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'NP Quote Request for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily disable the NP Quote Request for WooCommerce plugin until patched

wp plugin deactivate woo-rfq-for-woocommerce

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests to vulnerable plugin endpoints
  • Restrict access to the plugin's quote request functionality using .htaccess or web server configuration

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for NP Quote Request for WooCommerce version 1.9.179 or earlier

Check Version:

wp plugin get woo-rfq-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.9.179 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to quote request endpoints from unauthenticated users
  • Multiple failed or successful requests to quote-related URLs without authentication

Network Indicators:

  • HTTP requests to /wp-content/plugins/woo-rfq-for-woocommerce/ endpoints without authentication cookies

SIEM Query:

source="web_server" AND (uri="*woo-rfq-for-woocommerce*" OR uri="*quote*request*") AND NOT (cookie="*wordpress_logged_in*" OR auth="*")

🔗 References

📤 Share & Export