CVE-2024-22135

8.0 HIGH

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to WordPress sites using the WebToffee Order Export & Order Import for WooCommerce plugin. It affects all versions up to 2.4.3, potentially leading to remote code execution or site takeover. Any WordPress site with this vulnerable plugin installed is at risk.

💻 Affected Systems

Products:
  • WebToffee Order Export & Order Import for WooCommerce WordPress plugin
Versions: All versions up to and including 2.4.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on a WordPress site with WooCommerce.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise via webshell upload leading to remote code execution, data theft, defacement, or malware distribution.

🟠

Likely Case

Attackers upload malicious files like PHP webshells to gain persistent access and execute arbitrary commands on the server.

🟢

If Mitigated

If proper file upload restrictions and web application firewalls are in place, exploitation attempts would be blocked or detected.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal WordPress instances could still be targeted via phishing or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level access or higher, but the vulnerability is well-documented and easy to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.4

Vendor Advisory: https://patchstack.com/database/vulnerability/order-import-export-for-woocommerce/wordpress-order-export-order-import-for-woocommerce-plugin-2-4-3-arbitrary-file-upload-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Order Export & Order Import for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.4.4+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate order-import-export-for-woocommerce

Restrict file uploads via .htaccess

linux

Block execution of uploaded files in wp-content/uploads directory

Add to .htaccess in wp-content/uploads: <Files *.php> deny from all </Files>

🧯 If You Can't Patch

  • Implement strict file upload validation at web application firewall level
  • Restrict plugin access to admin users only and implement strong authentication controls

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'Order Export & Order Import for WooCommerce' version 2.4.3 or lower

Check Version:

wp plugin get order-import-export-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 2.4.4 or higher in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads directory
  • POST requests to plugin-specific endpoints with file parameters
  • Execution of unexpected PHP files in uploads directory

Network Indicators:

  • HTTP POST requests with file uploads to /wp-content/plugins/order-import-export-for-woocommerce/ endpoints

SIEM Query:

source="web_logs" AND (uri="/wp-content/plugins/order-import-export-for-woocommerce/*" AND method="POST" AND (file_upload="true" OR contains(content_type, "multipart/form-data")))

🔗 References

📤 Share & Export