CVE-2024-7032
📋 TL;DR
This vulnerability allows unauthenticated attackers to deactivate the Smart Online Order for Clover WordPress plugin and delete all its database tables. Any WordPress site using vulnerable versions of this plugin is affected, potentially causing service disruption and data loss.
💻 Affected Systems
- Smart Online Order for Clover WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of all plugin data including order history, customer information, and configuration settings, requiring full restoration from backups and causing extended service disruption.
Likely Case
Plugin deactivation and deletion of plugin tables, disrupting online ordering functionality until plugin is reinstalled and reconfigured.
If Mitigated
Minimal impact if proper access controls and database backups are in place, allowing quick restoration.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint with no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.7 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/readme.txt
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Smart Online Order for Clover'. 4. Click 'Update Now' or manually update to version 1.5.7+. 5. Verify plugin is active and functioning.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDeactivate the vulnerable plugin until patched version is available
wp plugin deactivate clover-online-orders
Web Application Firewall Rule
allBlock access to the vulnerable endpoint
Location: /wp-admin/admin-ajax.php?action=moo_deactivateAndClean
🧯 If You Can't Patch
- Deactivate the plugin immediately and use alternative ordering methods
- Implement strict network access controls to limit who can access the WordPress admin interface
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Smart Online Order for Clover. If version is 1.5.6 or lower, you are vulnerable.
Check Version:
wp plugin get clover-online-orders --field=version
Verify Fix Applied:
After updating, verify plugin version shows 1.5.7 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=moo_deactivateAndClean
- Database DROP TABLE queries for moo_* tables
- Plugin deactivation events in WordPress logs
Network Indicators:
- Unusual POST requests to WordPress admin-ajax endpoint from unauthenticated sources
SIEM Query:
source="wordpress.log" AND "moo_deactivateAndClean" OR source="web.log" AND "/wp-admin/admin-ajax.php" AND "action=moo_deactivateAndClean"
🔗 References
- https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/includes/moo-OnlineOrders-deactivator.php#L29
- https://plugins.trac.wordpress.org/browser/clover-online-orders/trunk/moo_OnlineOrders.php#L183
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9a6b05b1-c649-4b72-b884-11fb83ec77f2?source=cve