CVE-2024-56008

7.5 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Spreadr Woocommerce WordPress plugin that allows attackers to access functionality not properly constrained by access controls. Attackers can delete arbitrary content without proper authorization. All WordPress sites running affected versions of the Spreadr Woocommerce plugin are vulnerable.

💻 Affected Systems

Products:
  • Spreadr Woocommerce WordPress Plugin
Versions: n/a through 1.0.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using the vulnerable plugin versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website compromise through content deletion leading to data loss, defacement, or business disruption.

🟠

Likely Case

Unauthorized users deleting products, pages, or other content causing operational impact and data loss.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but authorization bypass makes it accessible to lower-privileged users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/spreadr-for-woocomerce/vulnerability/wordpress-spreadr-woocommerce-plugin-1-0-4-arbitrary-content-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Spreadr Woocommerce plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin, then install latest version from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched version is available.

wp plugin deactivate spreadr-for-woocomerce

Restrict Access

all

Implement strict access controls and monitoring for content deletion actions.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized content deletion requests
  • Enable detailed logging and monitoring for content deletion activities and review regularly

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Spreadr Woocommerce version. If version is 1.0.4 or earlier, you are vulnerable.

Check Version:

wp plugin get spreadr-for-woocomerce --field=version

Verify Fix Applied:

Verify plugin version is 1.0.5 or later in WordPress admin panel > Plugins > Installed Plugins.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to content deletion endpoints
  • Multiple content deletion actions from single user/session
  • Failed authorization checks for content management functions

Network Indicators:

  • Unusual patterns of content deletion API calls
  • Requests bypassing normal authorization flows

SIEM Query:

source="wordpress" AND (event="content_deletion" OR event="post_delete") AND user_role!="administrator"

🔗 References

📤 Share & Export