CVE-2024-7032

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to deactivate the Smart Online Order for Clover WordPress plugin and delete all its database tables. Any WordPress site using vulnerable versions of this plugin is affected, potentially causing service disruption and data loss.

💻 Affected Systems

Products:
  • Smart Online Order for Clover WordPress plugin
Versions: All versions up to and including 1.5.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of all plugin data including order history, customer information, and configuration settings, requiring full restoration from backups and causing extended service disruption.

🟠

Likely Case

Plugin deactivation and deletion of plugin tables, disrupting online ordering functionality until plugin is reinstalled and reconfigured.

🟢

If Mitigated

Minimal impact if proper access controls and database backups are in place, allowing quick restoration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint with no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/readme.txt

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Smart Online Order for Clover'. 4. Click 'Update Now' or manually update to version 1.5.7+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the vulnerable plugin until patched version is available

wp plugin deactivate clover-online-orders

Web Application Firewall Rule

all

Block access to the vulnerable endpoint

Location: /wp-admin/admin-ajax.php?action=moo_deactivateAndClean

🧯 If You Can't Patch

  • Deactivate the plugin immediately and use alternative ordering methods
  • Implement strict network access controls to limit who can access the WordPress admin interface

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Smart Online Order for Clover. If version is 1.5.6 or lower, you are vulnerable.

Check Version:

wp plugin get clover-online-orders --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.5.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=moo_deactivateAndClean
  • Database DROP TABLE queries for moo_* tables
  • Plugin deactivation events in WordPress logs

Network Indicators:

  • Unusual POST requests to WordPress admin-ajax endpoint from unauthenticated sources

SIEM Query:

source="wordpress.log" AND "moo_deactivateAndClean" OR source="web.log" AND "/wp-admin/admin-ajax.php" AND "action=moo_deactivateAndClean"

🔗 References

📤 Share & Export