CVE-2024-31359
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Premmerce Product Filter for WooCommerce WordPress plugin. It allows unauthorized users to perform actions that should require authentication, affecting all sites running versions up to 3.7.2.
💻 Affected Systems
- Premmerce Product Filter for WooCommerce
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could modify product filter settings, potentially disrupting e-commerce functionality or altering how products are displayed to customers.
Likely Case
Low-privileged users or attackers could change filter configurations, causing minor site disruptions or inconsistent user experiences.
If Mitigated
With proper authorization controls, only authenticated administrators could modify filter settings, preventing unauthorized changes.
🎯 Exploit Status
Exploitation requires some level of access but bypasses authorization checks. No public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.7.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Premmerce Product Filter for WooCommerce'. 4. Click 'Update Now' if available, or manually update to version 3.7.3+. 5. Verify plugin functionality after update.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched version is available
wp plugin deactivate premmerce-woocommerce-product-filter
🧯 If You Can't Patch
- Implement network-level access controls to restrict access to WordPress admin areas
- Monitor and audit any changes to product filter settings in WordPress
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Premmerce Product Filter for WooCommerce version. If version is 3.7.2 or earlier, you are vulnerable.
Check Version:
wp plugin get premmerce-woocommerce-product-filter --field=version
Verify Fix Applied:
Verify plugin version is 3.7.3 or later in WordPress admin panel. Test filter functionality remains working.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized POST requests to product filter endpoints
- Unexpected modifications to filter settings in WordPress logs
Network Indicators:
- Unusual traffic patterns to /wp-admin/admin-ajax.php or plugin-specific endpoints
SIEM Query:
source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR plugin="premmerce-woocommerce-product-filter") AND status_code=200 AND user_role!="administrator"
🔗 References
- https://patchstack.com/database/vulnerability/premmerce-woocommerce-product-filter/wordpress-premmerce-product-filter-for-woocommerce-plugin-3-7-2-broken-access-control-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/premmerce-woocommerce-product-filter/wordpress-premmerce-product-filter-for-woocommerce-plugin-3-7-2-broken-access-control-vulnerability?_s_id=cve