CVE-2024-35658

8.6 HIGH

📋 TL;DR

This is an unauthenticated path traversal vulnerability in ThemeHigh's Checkout Field Editor for WooCommerce Pro plugin that allows attackers to delete arbitrary files on the server. It affects all WordPress sites running vulnerable versions of this premium WooCommerce plugin. Attackers can exploit this without any authentication.

💻 Affected Systems

Products:
  • ThemeHigh Checkout Field Editor for WooCommerce (Pro)
Versions: All versions through 3.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Pro (premium) version of the plugin, not the free version. Requires WooCommerce to be installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through deletion of critical system files, website defacement, or deletion of WordPress core files leading to site unavailability.

🟠

Likely Case

Website defacement, deletion of WordPress configuration files, or deletion of plugin/theme files causing functionality loss.

🟢

If Mitigated

Limited to deletion of non-critical files if proper file permissions and web server restrictions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack. Attack requires no authentication and minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.3 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woocommerce-checkout-field-editor-pro/wordpress-checkout-field-editor-for-woocommerce-pro-plugin-3-6-2-unauthenticated-arbitrary-file-deletion-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Checkout Field Editor for WooCommerce (Pro)'. 4. Click 'Update Now' if update available. 5. If no update appears, download version 3.6.3+ from ThemeHigh and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate woocommerce-checkout-field-editor-pro

Restrict File Deletion

linux

Set restrictive file permissions on critical directories

chmod 755 /var/www/html/wp-content
chmod 644 /var/www/html/wp-config.php

🧯 If You Can't Patch

  • Disable the Checkout Field Editor for WooCommerce Pro plugin immediately
  • Implement web application firewall (WAF) rules to block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Checkout Field Editor for WooCommerce (Pro) version. If version is 3.6.2 or lower, you are vulnerable.

Check Version:

wp plugin get woocommerce-checkout-field-editor-pro --field=version

Verify Fix Applied:

Verify plugin version is 3.6.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • File deletion operations in web server logs
  • 404 errors for existing files

Network Indicators:

  • HTTP requests with path traversal payloads to WooCommerce endpoints

SIEM Query:

source="web_access.log" AND (uri="*../*" OR uri="*..%2f*") AND (uri="*wc-checkout-field-editor*" OR uri="*woocommerce*")

🔗 References

📤 Share & Export