CVE-2024-32811

5.3 MEDIUM

📋 TL;DR

This vulnerability allows sensitive information to be written to log files in the Octolize USPS Shipping for WooCommerce plugin. Attackers could potentially access these logs to obtain sensitive data. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • Octolize USPS Shipping for WooCommerce – Live Rates
Versions: n/a through 1.9.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. Log file location and accessibility depends on server configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive shipping data, customer information, or authentication credentials stored in log files, leading to data breaches or account compromise.

🟠

Likely Case

Unauthorized users access log files containing shipping details, customer addresses, or partial order information through web-accessible directories.

🟢

If Mitigated

Log files are properly secured with restricted permissions and not accessible via web, limiting exposure to authorized administrators only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to log file locations, which may be predictable or discoverable through directory traversal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/flexible-shipping-usps/wordpress-usps-shipping-for-woocommerce-live-rates-plugin-1-9-4-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'USPS Shipping for WooCommerce – Live Rates'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.9.5+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Restrict log file access

all

Configure web server to block access to plugin log directories

For Apache: Add 'Deny from all' to .htaccess in plugin log directory
For Nginx: Add 'location ~* \.log$ { deny all; }' to site configuration

Disable debug logging

all

Disable plugin debug logging if feature exists

Check plugin settings for debug/logging options and disable

🧯 If You Can't Patch

  • Disable the plugin entirely until patched
  • Implement strict file permissions (chmod 600) on log files and directories

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'USPS Shipping for WooCommerce – Live Rates' version 1.9.4 or lower

Check Version:

wp plugin list --name='USPS Shipping for WooCommerce – Live Rates' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 1.9.5 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to .log files in plugin directories
  • HTTP requests to predictable log file paths

Network Indicators:

  • HTTP requests with .log extensions to plugin directories
  • Directory traversal attempts

SIEM Query:

http.url:*log AND http.url:*usps-shipping* OR http.url:*flexible-shipping*

🔗 References

📤 Share & Export