First published: Wed Nov 13 2024(Updated: )
The Advanced Order Export For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.5.5 via deserialization of untrusted input during Order export when the "Try to convert serialized values" option is enabled. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
AlgolPlus Advanced Order Export For WooCommerce | <3.5.6 | |
AlgolPlus Advanced Order Export For WooCommerce | <3.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10828 is considered high severity due to its potential for PHP Object Injection vulnerabilities.
CVE-2024-10828 affects all versions of the Advanced Order Export for WooCommerce plugin up to and including 3.5.5.
To fix CVE-2024-10828, update the Advanced Order Export for WooCommerce plugin to version 3.5.6 or later.
CVE-2024-10828 is caused by the deserialization of untrusted input during order export when the 'Try to convert serialized values' option is enabled.
Yes, CVE-2024-10828 can be easily exploited if the vulnerable plugin is used in a WordPress site without proper input validation.