CVE-2024-35724

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Bosa Elementor Addons and Templates for WooCommerce WordPress plugin. It allows unauthorized users to perform actions that should require proper authentication, affecting all WordPress sites using vulnerable versions of this plugin.

💻 Affected Systems

Products:
  • Bosa Elementor Addons and Templates for WooCommerce WordPress plugin
Versions: All versions through 1.0.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin activated. Requires WooCommerce to be installed for full functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify WooCommerce settings, access sensitive data, or manipulate store functionality leading to data integrity issues or business disruption.

🟠

Likely Case

Unauthorized users could access administrative functions they shouldn't have permission to, potentially modifying store settings or viewing restricted information.

🟢

If Mitigated

With proper access controls and authentication mechanisms in place, the vulnerability would be prevented from being exploited.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing, and the plugin is specifically for WooCommerce stores which are public websites.
🏢 Internal Only: LOW - This primarily affects public-facing WordPress/WooCommerce installations rather than internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically have low exploitation complexity as they involve accessing endpoints without proper authentication checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.13 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/bosa-elementor-for-woocommerce/wordpress-bosa-elementor-addons-and-templates-for-woocommerce-plugin-1-0-12-broken-access-control-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Bosa Elementor Addons and Templates for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.0.13+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Bosa Elementor Addons plugin until patched

wp plugin deactivate bosa-elementor-for-woocommerce

Restrict access via web application firewall

all

Block access to vulnerable plugin endpoints using WAF rules

🧯 If You Can't Patch

  • Implement strict access controls and authentication checks at the application level
  • Monitor and audit all access to WooCommerce and plugin administrative functions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Bosa Elementor Addons and Templates for WooCommerce → Version. If version is 1.0.12 or lower, you are vulnerable.

Check Version:

wp plugin get bosa-elementor-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 1.0.13 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to WooCommerce/admin endpoints
  • Unusual plugin file access patterns
  • Failed authentication attempts followed by successful administrative actions

Network Indicators:

  • HTTP requests to plugin endpoints without proper authentication headers
  • Unusual API calls to WooCommerce functions

SIEM Query:

source="wordpress.log" AND ("bosa-elementor" OR "woocommerce") AND ("unauthorized" OR "403" OR "admin" OR "wp-admin")

🔗 References

📤 Share & Export