CVE-2024-6560
📋 TL;DR
The Addonify Quick View for WooCommerce WordPress plugin discloses full server path information to unauthenticated attackers due to improper access restrictions on mobiledetect library files. This vulnerability affects all versions up to 1.2.16. While the path disclosure alone doesn't enable direct compromise, it can assist attackers in planning further attacks against vulnerable websites.
💻 Affected Systems
- Addonify - Quick View For WooCommerce WordPress Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers combine path disclosure with other vulnerabilities (like local file inclusion or directory traversal) to execute arbitrary code, access sensitive files, or compromise the server.
Likely Case
Attackers gather reconnaissance information about server structure to plan targeted attacks, increasing success probability for subsequent exploitation attempts.
If Mitigated
Path information is exposed but cannot be leveraged due to proper security controls, minimal additional risk beyond information disclosure.
🎯 Exploit Status
Simple HTTP requests to exposed mobiledetect files trigger path disclosure without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.17 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3121821%40addonify-quick-view&new=3121821%40addonify-quick-view
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Addonify - Quick View For WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.2.17+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Block Direct Access to mobiledetect Files
linuxAdd .htaccess rules to prevent direct access to vulnerable mobiledetect files
# Add to .htaccess in plugin directory
<Files "exportToJSON.php">
Order Allow,Deny
Deny from all
</Files>
# Alternative: Block entire mobiledetect directory
<Directory "/wp-content/plugins/addonify-quick-view/vendor/mobiledetect">
Order Allow,Deny
Deny from all
</Directory>
🧯 If You Can't Patch
- Disable or remove the Addonify Quick View plugin until patched
- Implement web application firewall rules to block requests to /vendor/mobiledetect/ paths
🔍 How to Verify
Check if Vulnerable:
Access https://[your-site]/wp-content/plugins/addonify-quick-view/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php - if it returns server path information, you're vulnerable.
Check Version:
Check WordPress admin Plugins page or examine /wp-content/plugins/addonify-quick-view/addonify-quick-view.php header for version
Verify Fix Applied:
After update, attempt same URL access - should return 403/404 error or blank page instead of path disclosure.
📡 Detection & Monitoring
Log Indicators:
- HTTP 200 responses to paths containing '/vendor/mobiledetect/mobiledetectlib/export/'
- Unusual requests to plugin vendor directories from external IPs
Network Indicators:
- GET requests to exportToJSON.php file
- Traffic patterns showing reconnaissance activity
SIEM Query:
http.url:"*/vendor/mobiledetect/mobiledetectlib/export/*" AND http.status_code:200
🔗 References
- https://plugins.trac.wordpress.org/browser/addonify-quick-view/trunk/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3121821%40addonify-quick-view&new=3121821%40addonify-quick-view&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c38eaab5-157c-43fa-ad67-6f063274ba69?source=cve
- https://plugins.trac.wordpress.org/browser/addonify-quick-view/trunk/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3121821%40addonify-quick-view&new=3121821%40addonify-quick-view&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c38eaab5-157c-43fa-ad67-6f063274ba69?source=cve