First published: Thu Mar 20 2025(Updated: )
The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.6.0 via the validate_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebToffee Order Export & Order Import for WooCommerce | <=2.6.0 | |
WebToffee Order Export & Order Import for WooCommerce | <2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13923 is considered a critical severity vulnerability due to the potential for Server-Side Request Forgery.
To fix CVE-2024-13923, update the Order Export & Order Import for WooCommerce plugin to version 2.6.1 or later.
Authenticated users with Administrator-level access are affected by CVE-2024-13923.
CVE-2024-13923 exploits the validate_file() function, allowing unauthorized requests from the server.
All versions of the Order Export & Order Import for WooCommerce plugin up to and including 2.6.0 are vulnerable to CVE-2024-13923.