CVE-2024-8922

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with Author-level WordPress access to perform PHP object injection via deserialization of untrusted input. Attackers could potentially execute arbitrary code, delete files, or access sensitive data if a suitable POP chain exists through other installed plugins or themes. All WordPress sites using the vulnerable WooCommerce product catalog plugin are affected.

💻 Affected Systems

Products:
  • Product Enquiry for WooCommerce (WooCommerce product catalog plugin for WordPress)
Versions: All versions up to and including 2.2.33.32
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Attack requires Author-level user authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or website defacement if a POP chain exists via other installed components.

🟠

Likely Case

Limited impact due to requirement for Author-level authentication and lack of known POP chain in the vulnerable plugin itself, but potential for data exposure or file deletion if vulnerable plugins/themes are present.

🟢

If Mitigated

Minimal impact with proper access controls, plugin isolation, and security monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and depends on presence of POP chains from other installed plugins/themes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.2.33.32

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3155863/enquiry-quotation-for-woocommerce

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'Product Enquiry for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the vulnerable plugin until patched

wp plugin deactivate enquiry-quotation-for-woocommerce
wp plugin delete enquiry-quotation-for-woocommerce

Restrict user roles

all

Limit Author-level and higher user accounts to trusted personnel only

🧯 If You Can't Patch

  • Implement strict access controls for Author-level and higher WordPress user roles
  • Monitor for suspicious activity from Author-level accounts and review installed plugins/themes for potential POP chains

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin panel under Plugins > Product Enquiry for WooCommerce

Check Version:

wp plugin get enquiry-quotation-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is higher than 2.2.33.32 and check that enquiry_detail.php no longer contains unsafe deserialization

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to enquiry_detail.php
  • Suspicious activity from Author-level user accounts
  • Unexpected file deletions or modifications

Network Indicators:

  • HTTP requests containing serialized PHP objects in POST data to WooCommerce enquiry endpoints

SIEM Query:

source="wordpress.log" AND "enquiry_detail.php" AND (POST OR PUT) AND ("O:" OR "C:" OR "a:" in request_body)

🔗 References

📤 Share & Export