CVE-2024-23512

8.7 HIGH

📋 TL;DR

This CVE describes a PHP object injection vulnerability in the ProductX WordPress plugin that allows attackers to execute arbitrary code through deserialization of untrusted data. It affects WordPress sites using ProductX – WooCommerce Builder & Gutenberg WooCommerce Blocks plugin. Attackers can exploit this to gain unauthorized access and control over affected websites.

💻 Affected Systems

Products:
  • ProductX – WooCommerce Builder & Gutenberg WooCommerce Blocks WordPress plugin
Versions: All versions through 3.1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the ProductX plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, malware installation, and server takeover.

🟠

Likely Case

Unauthorized administrative access, data manipulation, backdoor installation, and privilege escalation.

🟢

If Mitigated

Limited impact if proper input validation and security controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack; exploitation requires sending crafted payloads to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/product-blocks/wordpress-productx-plugin-3-1-4-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'ProductX – WooCommerce Builder & Gutenberg WooCommerce Blocks'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 3.1.5+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable ProductX Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate product-blocks

Restrict Plugin Access

all

Use web application firewall to block requests to ProductX endpoints

🧯 If You Can't Patch

  • Disable the ProductX plugin immediately
  • Implement strict input validation and sanitization for all user inputs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → ProductX version. If version is 3.1.4 or earlier, you are vulnerable.

Check Version:

wp plugin get product-blocks --field=version

Verify Fix Applied:

Verify ProductX plugin version is 3.1.5 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to ProductX plugin endpoints
  • PHP error logs containing unserialize() warnings
  • Unexpected file uploads or code execution attempts

Network Indicators:

  • HTTP requests containing serialized PHP objects
  • Traffic to ProductX-specific admin-ajax.php endpoints with suspicious parameters

SIEM Query:

source="wordpress.log" AND ("productx" OR "product-blocks") AND ("unserialize" OR "php_object" OR "injection")

🔗 References

📤 Share & Export