CVE-2024-13622
📋 TL;DR
The File Uploads Addon for WooCommerce WordPress plugin exposes sensitive customer data through insecure directory permissions. Unauthenticated attackers can access files in the /wp-content/uploads directory, potentially extracting customer-uploaded attachments. All WordPress sites using this plugin up to version 1.7.1 are affected.
💻 Affected Systems
- File Uploads Addon for WooCommerce WordPress plugin
📦 What is this software?
File Uploads Addon For Woocommerce by Imaginate Solutions
View all CVEs affecting File Uploads Addon For Woocommerce →
⚠️ Risk & Real-World Impact
Worst Case
Attackers exfiltrate sensitive customer documents (IDs, contracts, personal files) leading to data breach, regulatory fines, and reputational damage.
Likely Case
Unauthenticated access to customer-uploaded files containing personal information, violating data protection regulations.
If Mitigated
Limited exposure if directory permissions are properly configured or sensitive files aren't stored in the uploads directory.
🎯 Exploit Status
Exploitation requires directory traversal or direct access to the insecure uploads directory. No special tools needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.7.2 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'File Uploads Addon for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Restrict directory access via .htaccess
ApacheAdd access controls to prevent unauthorized access to the uploads directory
Add to /wp-content/uploads/.htaccess: Order Deny,Allow
Deny from all
<FilesMatch "\.(jpg|jpeg|png|gif|pdf)$">
Order Allow,Deny
Allow from all
</FilesMatch>
Move sensitive files outside web root
allConfigure plugin to store uploaded files outside publicly accessible directories
🧯 If You Can't Patch
- Disable the File Uploads Addon plugin immediately
- Implement web application firewall rules to block access to sensitive upload directories
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 1.7.1 or lower, you are vulnerable.
Check Version:
wp plugin list --name='File Uploads Addon for WooCommerce' --field=version (WP-CLI) or check WordPress admin panel
Verify Fix Applied:
After updating, verify version is 1.7.2 or higher. Test by attempting to access /wp-content/uploads/woo-addon-uploads/ directory without authentication.
📡 Detection & Monitoring
Log Indicators:
- Multiple 200/403 requests to /wp-content/uploads/woo-addon-uploads/ paths from unauthenticated users
- Unusual file download patterns from uploads directory
Network Indicators:
- HTTP GET requests to uploads directory without session cookies
- Burst of requests to specific file patterns in uploads
SIEM Query:
source="web_access_logs" AND (uri_path="/wp-content/uploads/woo-addon-uploads/*" OR uri_path="/wp-content/uploads/*") AND status_code=200 AND NOT user_agent="bot|crawler"
🔗 References
- https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.php#L81
- https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.php#L80
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017b?source=cve