CVE-2024-35662
📋 TL;DR
This CVE describes a Missing Authorization vulnerability in the Simple COD Fees for WooCommerce WordPress plugin. It allows unauthorized users to perform administrative actions like modifying plugin settings. All WordPress sites using affected plugin versions are vulnerable.
💻 Affected Systems
- Simple COD Fees for WooCommerce WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify payment settings, add unauthorized fees to orders, or potentially escalate privileges to compromise the entire WordPress installation.
Likely Case
Unauthorized users could manipulate COD (Cash on Delivery) fee settings, affecting store pricing and potentially causing financial loss or customer dissatisfaction.
If Mitigated
With proper authorization controls, only authenticated administrators could modify plugin settings, preventing unauthorized changes.
🎯 Exploit Status
Exploitation requires some WordPress/WooCommerce knowledge but is straightforward once the vulnerability is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Simple COD Fees for WooCommerce'. 4. Click 'Update Now' if available, or download version 2.0.3+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate simple-cod-fee-for-woocommerce
Restrict Admin Access
allLimit access to WordPress admin area to trusted IP addresses only
🧯 If You Can't Patch
- Implement strict access controls to WordPress admin area using IP whitelisting
- Monitor plugin settings changes and audit logs for unauthorized modifications
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins → Simple COD Fees for WooCommerce version
Check Version:
wp plugin get simple-cod-fee-for-woocommerce --field=version
Verify Fix Applied:
Verify plugin version is 2.0.3 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unauthorized POST requests to plugin admin endpoints
- Changes to COD fee settings from non-admin users
Network Indicators:
- HTTP requests to /wp-admin/admin.php?page=wc-settings&tab=checkout§ion=cod_fee from unauthorized IPs
SIEM Query:
source="wordpress.log" AND ("cod_fee" OR "simple-cod-fee") AND ("POST /wp-admin/" OR "admin.php")
🔗 References
- https://patchstack.com/database/vulnerability/simple-cod-fee-for-woocommerce/wordpress-simple-cod-fees-for-woocommerce-plugin-2-0-2-broken-access-control-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/simple-cod-fee-for-woocommerce/wordpress-simple-cod-fees-for-woocommerce-plugin-2-0-2-broken-access-control-vulnerability?_s_id=cve