CVE-2024-13920

4.9 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress administrators to perform directory traversal attacks via the Order Export & Order Import for WooCommerce plugin. Attackers can read arbitrary log files on the server, potentially exposing sensitive information. Only WordPress sites using vulnerable versions of this specific plugin are affected.

💻 Affected Systems

Products:
  • Order Export & Order Import for WooCommerce WordPress plugin
Versions: All versions up to and including 2.6.0
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. Plugin must be installed and active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator credentials are compromised, allowing attackers to read sensitive server logs containing database credentials, API keys, or other confidential data, leading to full site compromise.

🟠

Likely Case

Attackers with administrator access read log files containing user information, order details, or debugging data that could be used for further attacks.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized log file access by already-privileged users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The vulnerability is in the download_file() function which doesn't properly validate file paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.1

Vendor Advisory: https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Order Export & Order Import for WooCommerce'. 4. Click 'Update Now' if available, or download version 2.6.1+ from WordPress repository. 5. Deactivate and delete old version if manual update required.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate order-import-export-for-woocommerce

Restrict administrator access

all

Review and limit administrator accounts to trusted users only

🧯 If You Can't Patch

  • Implement strict file permission controls on log directories
  • Monitor administrator account activity and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 2.6.0 or lower, you are vulnerable.

Check Version:

wp plugin get order-import-export-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 2.6.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs, especially requests to download_file with path traversal sequences (../)

Network Indicators:

  • HTTP requests to admin-ajax.php or admin-post.php with file download parameters containing path traversal

SIEM Query:

source="web_access" AND (uri="*admin-ajax.php*" OR uri="*admin-post.php*") AND (params="*download_file*" AND params="*../*")

🔗 References

📤 Share & Export