CVE-2024-39650

7.3 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WPWeb Elite WooCommerce PDF Vouchers plugin for WordPress. It allows unauthenticated attackers to access functionality that should be restricted by access controls. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • WPWeb Elite WooCommerce PDF Vouchers WordPress Plugin
Versions: All versions up to and including 4.9.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the PDF Vouchers plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive voucher data, generate unauthorized vouchers, manipulate voucher settings, or potentially escalate privileges within the WooCommerce system.

🟠

Likely Case

Unauthenticated attackers accessing voucher management functions, viewing voucher details, or generating unauthorized PDF vouchers.

🟢

If Mitigated

With proper network segmentation and web application firewalls, exploitation attempts would be blocked or detected before causing damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access to restricted endpoints makes exploitation straightforward for attackers with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.5 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/woocommerce-pdf-vouchers/wordpress-woocommerce-pdf-vouchers-plugin-4-9-3-unauthenticated-multiple-vulnerabilities?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce PDF Vouchers' and click 'Update Now'. 4. Verify update to version 4.9.5 or later.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate woocommerce-pdf-vouchers

Web Application Firewall Rule

all

Block access to vulnerable plugin endpoints

Add WAF rule to block requests to /wp-content/plugins/woocommerce-pdf-vouchers/* for unauthenticated users

🧯 If You Can't Patch

  • Deactivate the WooCommerce PDF Vouchers plugin immediately
  • Implement strict network access controls to limit who can access the WordPress admin interface

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for WooCommerce PDF Vouchers version 4.9.4 or earlier

Check Version:

wp plugin get woocommerce-pdf-vouchers --field=version

Verify Fix Applied:

Verify plugin version is 4.9.5 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /wp-content/plugins/woocommerce-pdf-vouchers/ endpoints
  • Multiple failed authentication attempts followed by successful access to voucher functions

Network Indicators:

  • Unusual traffic patterns to plugin-specific endpoints from unauthenticated sources
  • Spikes in PDF generation requests

SIEM Query:

source="wordpress.log" AND (uri="/wp-content/plugins/woocommerce-pdf-vouchers/*" AND user="-")

🔗 References

📤 Share & Export