CVE-2024-13831

7.2 HIGH

📋 TL;DR

The Tabs for WooCommerce WordPress plugin is vulnerable to PHP object injection through deserialization of untrusted input. This allows authenticated attackers with Shop Manager or higher privileges to inject malicious PHP objects. Impact requires a separate plugin or theme with a POP chain to enable actions like file deletion, data theft, or code execution.

💻 Affected Systems

Products:
  • Tabs for WooCommerce WordPress plugin
Versions: All versions up to and including 1.0.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Exploitation requires Shop Manager or higher privileges and a compatible POP chain from another plugin/theme.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could achieve remote code execution, delete critical files, or steal sensitive data, potentially compromising the entire WordPress site.

🟠

Likely Case

Limited impact due to requirement for both authenticated access and a compatible POP chain; most sites will experience no direct exploitation unless specifically targeted.

🟢

If Mitigated

With proper access controls and no vulnerable POP chains present, the vulnerability has minimal to no impact on site security.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access (Shop Manager+) and depends on availability of POP chains in other installed components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.0.0

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wc-tabs/trunk/wc-tabs-lite.php#L363

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Tabs for WooCommerce'. 4. Click 'Update Now' if available, or manually update to latest version. 5. Verify plugin is updated to version after 1.0.0.

🔧 Temporary Workarounds

Remove vulnerable plugin

WordPress

Temporarily disable or remove the Tabs for WooCommerce plugin until patched version is available.

wp plugin deactivate wc-tabs
wp plugin delete wc-tabs

Restrict user privileges

all

Limit Shop Manager and higher privileged accounts to trusted users only.

🧯 If You Can't Patch

  • Remove the Tabs for WooCommerce plugin entirely from the WordPress installation.
  • Audit and remove any plugins/themes containing POP chains that could enable exploitation.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Tabs for WooCommerce' version 1.0.0 or earlier.

Check Version:

wp plugin get wc-tabs --field=version

Verify Fix Applied:

Confirm plugin version is greater than 1.0.0 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP deserialization errors in WordPress debug logs
  • Suspicious activity from Shop Manager or Admin accounts

Network Indicators:

  • POST requests to WooCommerce product endpoints with serialized data

SIEM Query:

source="wordpress.log" AND "product_has_custom_tabs" AND ("unserialize" OR "PHP Object")

🔗 References

📤 Share & Export