CVE-2024-31283

7.5 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Advanced Local Pickup for WooCommerce WordPress plugin. It allows attackers to bypass access controls and perform unauthorized actions. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • Advanced Local Pickup for WooCommerce WordPress plugin
Versions: n/a through 1.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify pickup settings, access sensitive order data, or disrupt store operations by manipulating pickup functionality.

🟠

Likely Case

Unauthorized users could view or modify pickup location settings, potentially causing order fulfillment issues or exposing limited operational data.

🟢

If Mitigated

With proper access controls and authentication checks, only authorized administrators could manage pickup settings.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some WordPress/WooCommerce knowledge but is straightforward once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/advanced-local-pickup-for-woocommerce/wordpress-advanced-local-pickup-for-woocommerce-plugin-1-6-2-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Advanced Local Pickup for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate advanced-local-pickup-for-woocommerce

Restrict Admin Access

all

Limit WordPress admin access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to plugin endpoints
  • Enable WordPress security plugins that monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Advanced Local Pickup for WooCommerce → Version. If version is 1.6.2 or earlier, you are vulnerable.

Check Version:

wp plugin get advanced-local-pickup-for-woocommerce --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.6.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-admin/admin-ajax.php with plugin-specific actions
  • Unusual modifications to pickup settings by non-admin users

Network Indicators:

  • HTTP requests to plugin endpoints from unauthorized IP addresses
  • POST requests to admin-ajax.php with pickup-related parameters

SIEM Query:

source="wordpress.log" AND ("advanced-local-pickup" OR "alp_" OR "pickup") AND (user_role!="administrator" OR user_id!="1")

🔗 References

📤 Share & Export