CVE-2025-0956

8.1 HIGH

📋 TL;DR

This CVE describes a PHP object injection vulnerability in the WooCommerce Recover Abandoned Cart WordPress plugin. Unauthenticated attackers can exploit it by manipulating the 'raccookie_guest_email' cookie, but actual impact requires another plugin/theme with a POP chain. All WordPress sites using this plugin up to version 24.3.0 are affected.

💻 Affected Systems

Products:
  • WooCommerce Recover Abandoned Cart WordPress Plugin
Versions: All versions up to and including 24.3.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the vulnerable plugin installed. Impact depends on presence of POP chains in other installed plugins/themes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could achieve remote code execution, delete files, or steal sensitive data.

🟠

Likely Case

Most installations will see no impact unless they have vulnerable plugins/themes with exploitable POP chains installed alongside this plugin.

🟢

If Mitigated

With proper input validation and secure deserialization, the vulnerability would be prevented entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires finding or creating a suitable POP chain from other installed components, which adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 24.3.0

Vendor Advisory: https://codecanyon.net/item/woocommerce-recover-abandoned-cart/7715167

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'WooCommerce Recover Abandoned Cart'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from CodeCanyon and manually update.

🔧 Temporary Workarounds

Input Validation Filter

WordPress

Add custom PHP filter to sanitize the raccookie_guest_email cookie before deserialization

Add to theme's functions.php or custom plugin: add_filter('woocommerce_recover_abandoned_cart_cookie_input', 'sanitize_cookie_input'); function sanitize_cookie_input($input) { return filter_var($input, FILTER_SANITIZE_STRING); }

🧯 If You Can't Patch

  • Disable the WooCommerce Recover Abandoned Cart plugin temporarily
  • Implement WAF rules to block requests containing serialized PHP objects in cookies

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'WooCommerce Recover Abandoned Cart' version 24.3.0 or earlier

Check Version:

wp plugin list --name='woocommerce-recover-abandoned-cart' --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is higher than 24.3.0 in WordPress admin plugins page

📡 Detection & Monitoring

Log Indicators:

  • Unusual cookie values containing serialized PHP objects in web server logs
  • Multiple failed deserialization attempts in PHP error logs

Network Indicators:

  • HTTP requests with manipulated raccookie_guest_email cookies containing serialized data

SIEM Query:

source="web_logs" AND cookie="*raccookie_guest_email*" AND (cookie="*O:*" OR cookie="*C:*" OR cookie="*a:*")

🔗 References

📤 Share & Export