CVE-2024-7503

9.8 CRITICAL

📋 TL;DR

The WooCommerce Social Login plugin for WordPress has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, including administrators, if they know the user ID. This affects all versions up to 2.7.5 when the email module is enabled. WordPress sites using this plugin are at immediate risk.

💻 Affected Systems

Products:
  • WooCommerce - Social Login WordPress Plugin
Versions: All versions up to and including 2.7.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the email module to be enabled in plugin settings. Vulnerability exists in the 'woo_slg_confirm_email_user' function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers gain administrative privileges, modify content, steal customer data, or install malicious plugins/themes.

🟢

If Mitigated

Limited impact if email module is disabled or strong network controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires knowledge of target user ID, which can often be enumerated. No authentication needed to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.6 or later

Vendor Advisory: https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Social Login' and check for updates. 4. Update to version 2.7.6 or higher. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Email Module

all

Temporarily disable the vulnerable email module in plugin settings

Disable Plugin

all

Deactivate the Social Login plugin until patched

🧯 If You Can't Patch

  • Disable the WooCommerce Social Login plugin immediately
  • Implement web application firewall rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > WooCommerce Social Login > Version. If version is 2.7.5 or lower, you are vulnerable.

Check Version:

wp plugin list --name='WooCommerce Social Login' --field=version

Verify Fix Applied:

Verify plugin version is 2.7.6 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts with user ID parameters
  • Multiple failed login attempts followed by successful login from same IP
  • Administrative actions from new/unexpected IP addresses

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with 'woo_slg_confirm_email_user' action
  • Requests containing user_id parameter with unusual values

SIEM Query:

source="wordpress.log" AND ("woo_slg_confirm_email_user" OR "user_id" AND "action=confirm_email")

🔗 References

📤 Share & Export