CVE-2024-13652

4.3 MEDIUM

📋 TL;DR

The ECPay Ecommerce for WooCommerce WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to clear the plugin's debug log files. This affects all versions up to 1.1.2411060. While it doesn't allow data theft or system compromise, it enables log tampering which can hinder forensic investigations.

💻 Affected Systems

Products:
  • ECPay Ecommerce for WooCommerce WordPress plugin
Versions: All versions up to and including 1.1.2411060
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit this.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could repeatedly clear debug logs to cover tracks after other attacks, making incident investigation and attribution impossible.

🟠

Likely Case

Malicious users or compromised accounts clearing logs to hide suspicious activity, potentially masking more serious security incidents.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary loss of debugging information without system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial to execute via crafted AJAX requests. The vulnerability is publicly documented with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.2411061 or later

Vendor Advisory: https://wordpress.org/plugins/ecpay-ecommerce-for-woocommerce/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ECPay Ecommerce for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Restrict User Roles

all

Limit user accounts with Subscriber role or higher to trusted individuals only.

Disable Plugin

linux

Temporarily disable the ECPay plugin if not actively needed for payment processing.

wp plugin deactivate ecpay-ecommerce-for-woocommerce

🧯 If You Can't Patch

  • Implement strict access controls and monitor user activity, especially for Subscriber-level accounts.
  • Enable comprehensive logging at the server/application level outside the plugin's control.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for ECPay Ecommerce for WooCommerce version. If version is 1.1.2411060 or lower, system is vulnerable.

Check Version:

wp plugin get ecpay-ecommerce-for-woocommerce --field=version

Verify Fix Applied:

After update, verify plugin version shows 1.1.2411061 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected clearing of ecpay debug logs
  • AJAX requests to 'clear_ecpay_debug_log' action from non-admin users

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=clear_ecpay_debug_log

SIEM Query:

source="wordpress" AND (url_path="/wp-admin/admin-ajax.php" AND post_data="action=clear_ecpay_debug_log")

🔗 References

📤 Share & Export