CVE-2024-11725
Published: 07 January 2025
Description
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the updateWcWarrantySettings() function in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. Please note this requires the woocommerce-warranty plugin to be installed in order to be exploited.
Security Summary
CVE-2024-11725 is a vulnerability in the SMS Alert Order Notifications – WooCommerce plugin for WordPress, affecting all versions up to and including 3.7.6. It arises from a missing capability check on the updateWcWarrantySettings() function, enabling unauthorized modification of data that results in privilege escalation (CWE-862). Exploitation requires the woocommerce-warranty plugin to also be installed on the target site. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-01-07.
Authenticated attackers with subscriber-level access or higher can exploit this vulnerability remotely over the network with low complexity. By calling the vulnerable function, they can update arbitrary WordPress site options, such as modifying the default user role for registrations to administrator and enabling user registration. This allows attackers to create accounts with full administrative privileges, potentially leading to complete site compromise.
WordPress plugin trac references, including code at helper/return-warranty.php (line 74) and changesets such as 3198056, 3197777, 3199795, and 3207391, document the issue and associated fixes in the sms-alert plugin repository. Security practitioners should update to a version beyond 3.7.6 to apply the capability checks and mitigate the risk.
Details
- CWE(s)