PHP Object Injection Vulnerability in Order Export & Order Import for WooCommerce Plugin by WordPress
CVE-2024-13921

7.2HIGH

What is CVE-2024-13921?

The Order Export & Order Import for WooCommerce plugin for WordPress is susceptible to PHP Object Injection due to the improper deserialization of untrusted input from the 'form_data' parameter. This vulnerability allows authenticated users with Administrator-level access to inject a PHP Object, posing a risk only when combined with another plugin or theme that contains a PHP Object Pollution (POP) chain. In such cases, the attacker can potentially execute actions such as deleting arbitrary files, accessing sensitive data, or executing malicious code, contingent upon the specifics of the existing POP chain.

Affected Version(s)

Order Export & Order Import for WooCommerce * <= 2.6.0

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hay Mizrachi
.
The Cyber Security Vulnerability Database.