CVE-2024-32811
📋 TL;DR
This vulnerability allows sensitive information to be written to log files in the Octolize USPS Shipping for WooCommerce plugin. Attackers could potentially access these logs to obtain sensitive data. All WordPress sites using affected versions of this plugin are vulnerable.
💻 Affected Systems
- Octolize USPS Shipping for WooCommerce – Live Rates
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to sensitive shipping data, customer information, or authentication credentials stored in log files, leading to data breaches or account compromise.
Likely Case
Unauthorized users access log files containing shipping details, customer addresses, or partial order information through web-accessible directories.
If Mitigated
Log files are properly secured with restricted permissions and not accessible via web, limiting exposure to authorized administrators only.
🎯 Exploit Status
Exploitation requires access to log file locations, which may be predictable or discoverable through directory traversal.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.5 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'USPS Shipping for WooCommerce – Live Rates'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.9.5+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Restrict log file access
allConfigure web server to block access to plugin log directories
For Apache: Add 'Deny from all' to .htaccess in plugin log directory
For Nginx: Add 'location ~* \.log$ { deny all; }' to site configuration
Disable debug logging
allDisable plugin debug logging if feature exists
Check plugin settings for debug/logging options and disable
🧯 If You Can't Patch
- Disable the plugin entirely until patched
- Implement strict file permissions (chmod 600) on log files and directories
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'USPS Shipping for WooCommerce – Live Rates' version 1.9.4 or lower
Check Version:
wp plugin list --name='USPS Shipping for WooCommerce – Live Rates' --field=version (if WP-CLI installed)
Verify Fix Applied:
Verify plugin version is 1.9.5 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to .log files in plugin directories
- HTTP requests to predictable log file paths
Network Indicators:
- HTTP requests with .log extensions to plugin directories
- Directory traversal attempts
SIEM Query:
http.url:*log AND http.url:*usps-shipping* OR http.url:*flexible-shipping*
🔗 References
- https://patchstack.com/database/vulnerability/flexible-shipping-usps/wordpress-usps-shipping-for-woocommerce-live-rates-plugin-1-9-4-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/flexible-shipping-usps/wordpress-usps-shipping-for-woocommerce-live-rates-plugin-1-9-4-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve