First published: Thu Jan 30 2025(Updated: )
The WooCommerce Wishlist (High customization, fast setup,Free Elementor Wishlist, most features) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.8.7 via the download_pdf_file() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to extract data from wishlists that they should not have access to.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WooCommerce Wishlist | <=1.8.7 | |
MoreConvert MC Woocommerce Wishlist | <1.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13694 is classified as a high severity vulnerability due to its potential for exploitation via insecure direct object reference.
CVE-2024-13694 affects WooCommerce Wishlist versions up to and including 1.8.7 by allowing unauthorized access to resources.
To fix CVE-2024-13694, update the WooCommerce Wishlist plugin to the latest version that addresses this vulnerability.
The vulnerability is associated with the download_pdf_file() function, which lacks proper validation.
Yes, CVE-2024-13694 can be exploited remotely due to insufficient access controls in the plugin.