CVE-2024-1862

8.1 HIGH

📋 TL;DR

This vulnerability in the WooCommerce Add to Cart Custom Redirect plugin allows authenticated attackers with contributor-level access or higher to modify arbitrary site options, potentially leading to data loss or unauthorized configuration changes. It affects all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • WooCommerce Add to Cart Custom Redirect plugin for WordPress
Versions: All versions up to and including 1.2.13
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have at least contributor-level WordPress user access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical WordPress options like site URL, admin email, or plugin settings, causing site disruption, data loss, or enabling further attacks.

🟠

Likely Case

Attackers with contributor access could disable security notices, modify plugin settings, or disrupt site functionality by changing configuration options.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to minor configuration changes that can be detected and reverted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.14

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?old_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.13&old=3047408&new_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.14&new=3047408

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'WooCommerce Add to Cart Custom Redirect'
4. Click 'Update Now' if available
5. If not available, download version 1.2.14 from WordPress repository and manually update

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the vulnerable plugin until patched

wp plugin deactivate woocommerce-add-to-cart-custom-redirect
wp plugin delete woocommerce-add-to-cart-custom-redirect

Restrict user roles

all

Limit contributor and author roles to trusted users only

🧯 If You Can't Patch

  • Disable the plugin entirely until patched
  • Implement strict access controls and monitor user activity logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'WooCommerce Add to Cart Custom Redirect' version 1.2.13 or lower

Check Version:

wp plugin get woocommerce-add-to-cart-custom-redirect --field=version

Verify Fix Applied:

Verify plugin version shows 1.2.14 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • WordPress admin actions from contributor users modifying site options
  • Plugin-specific function calls to 'wcr_dismiss_admin_notice'

Network Indicators:

  • POST requests to admin-ajax.php or admin-post.php with suspicious parameters

SIEM Query:

source="wordpress" action="option_update" user_role="contributor" OR user_role="author"

🔗 References

📤 Share & Export