CVE-2024-22135
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to WordPress sites using the WebToffee Order Export & Order Import for WooCommerce plugin. It affects all versions up to 2.4.3, potentially leading to remote code execution or site takeover. Any WordPress site with this vulnerable plugin installed is at risk.
💻 Affected Systems
- WebToffee Order Export & Order Import for WooCommerce WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site compromise via webshell upload leading to remote code execution, data theft, defacement, or malware distribution.
Likely Case
Attackers upload malicious files like PHP webshells to gain persistent access and execute arbitrary commands on the server.
If Mitigated
If proper file upload restrictions and web application firewalls are in place, exploitation attempts would be blocked or detected.
🎯 Exploit Status
Exploitation requires contributor-level access or higher, but the vulnerability is well-documented and easy to exploit once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.4
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Order Export & Order Import for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.4.4+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily deactivate the plugin until patched
wp plugin deactivate order-import-export-for-woocommerce
Restrict file uploads via .htaccess
linuxBlock execution of uploaded files in wp-content/uploads directory
Add to .htaccess in wp-content/uploads: <Files *.php> deny from all </Files>
🧯 If You Can't Patch
- Implement strict file upload validation at web application firewall level
- Restrict plugin access to admin users only and implement strong authentication controls
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Order Export & Order Import for WooCommerce' version 2.4.3 or lower
Check Version:
wp plugin get order-import-export-for-woocommerce --field=version
Verify Fix Applied:
Verify plugin version is 2.4.4 or higher in WordPress admin plugins page
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to wp-content/uploads directory
- POST requests to plugin-specific endpoints with file parameters
- Execution of unexpected PHP files in uploads directory
Network Indicators:
- HTTP POST requests with file uploads to /wp-content/plugins/order-import-export-for-woocommerce/ endpoints
SIEM Query:
source="web_logs" AND (uri="/wp-content/plugins/order-import-export-for-woocommerce/*" AND method="POST" AND (file_upload="true" OR contains(content_type, "multipart/form-data")))
🔗 References
- https://patchstack.com/database/vulnerability/order-import-export-for-woocommerce/wordpress-order-export-order-import-for-woocommerce-plugin-2-4-3-arbitrary-file-upload-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/order-import-export-for-woocommerce/wordpress-order-export-order-import-for-woocommerce-plugin-2-4-3-arbitrary-file-upload-vulnerability?_s_id=cve