CVE-2024-3957

6.5 MEDIUM

📋 TL;DR

The Booster for WooCommerce plugin (also known as WooCommerce Jetpack) contains a vulnerability that allows unauthenticated attackers to execute arbitrary WordPress shortcodes. This affects all WordPress sites running vulnerable versions of the plugin, potentially enabling attackers to perform actions depending on what other plugins with shortcode functionality are installed.

💻 Affected Systems

Products:
  • Booster for WooCommerce (WooCommerce Jetpack)
Versions: Up to and including 7.1.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Risk severity depends on what other WordPress plugins with shortcode functionality are installed alongside the vulnerable plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with plugins containing dangerous shortcodes, attackers could achieve remote code execution, data exfiltration, or complete site takeover.

🟠

Likely Case

Attackers can execute unauthorized shortcodes to modify content, redirect users, or access restricted functionality depending on installed plugins.

🟢

If Mitigated

With proper web application firewalls and security plugins, exploitation attempts can be blocked before reaching vulnerable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation makes this particularly dangerous. The vulnerability is in the product-by-user functionality where user input is not properly sanitized before being processed as shortcodes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.9

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3076207%40woocommerce-jetpack%2Ftrunk&old=3046146%40woocommerce-jetpack%2Ftrunk&sfp_email=&sfph_mail=#file7

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Booster for WooCommerce' or 'WooCommerce Jetpack'. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.1.9+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Booster for WooCommerce plugin until patched

wp plugin deactivate woocommerce-jetpack

Web Application Firewall rule

all

Block requests containing suspicious shortcode patterns

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user-controlled parameters
  • Deploy a web application firewall with rules to detect and block shortcode injection attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for 'Booster for WooCommerce' version 7.1.8 or lower

Check Version:

wp plugin get woocommerce-jetpack --field=version

Verify Fix Applied:

Verify plugin version is 7.1.9 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WooCommerce endpoints with shortcode-like parameters
  • Multiple failed shortcode execution attempts in WordPress debug logs

Network Indicators:

  • HTTP requests containing [shortcode] patterns in parameters
  • Unusual traffic to /wp-admin/admin-ajax.php or WooCommerce endpoints

SIEM Query:

web.url:*woocommerce* AND (web.param:*[shortcode]* OR web.param:*%5Bshortcode%5D*)

🔗 References

📤 Share & Export