First published: Thu Mar 07 2024(Updated: )
The PDF Invoices and Packing Slips For WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.7 via deserialization of untrusted input via the order_id parameter. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Acowebs PDF Invoices and Packing Slips for WooCommerce | <1.3.8 | |
WordPress PDF Invoices and Packing Slips For WooCommerce | <=1.3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1773 is considered a medium severity vulnerability due to the potential for PHP Object Injection.
To mitigate CVE-2024-1773, update the PDF Invoices and Packing Slips for WooCommerce plugin to version 1.3.8 or later.
CVE-2024-1773 affects users of the PDF Invoices and Packing Slips For WooCommerce plugin prior to version 1.3.8.
Authenticated attackers with subscriber-level access can exploit CVE-2024-1773 through deserialization of untrusted input.
Yes, CVE-2024-1773 can compromise the security of your website by allowing unauthorized actions via PHP Object Injection.