CVE-2024-12600
Published: 25 January 2025
Description
The Custom Product Tabs Lite for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.9.0 via deserialization of untrusted input from the 'frs_woo_product_tabs' parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Security Summary
CVE-2024-12600 is a PHP Object Injection vulnerability (CWE-502) affecting the Custom Product Tabs Lite for WooCommerce plugin for WordPress in all versions up to and including 1.9.0. The flaw arises from deserialization of untrusted input via the 'frs_woo_product_tabs' parameter, enabling authenticated attackers to inject a PHP Object. It has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), reflecting high confidentiality, integrity, and availability impacts under specific conditions.
Authenticated attackers with Shop Manager-level access or higher can exploit this vulnerability over the network with low complexity. While no known Proof-of-Concept (POP) chain exists within the vulnerable plugin itself, the injection could be leveraged if a POP chain is available through an additional plugin or theme on the target system, potentially allowing arbitrary file deletion, sensitive data retrieval, or remote code execution.
Advisories and references, including Wordfence's threat intelligence and WordPress plugin trac details, point to a patch in changeset 3226839, which addresses the deserialization issue around line 372 in the plugin's main file. Security practitioners should update to a patched version of the plugin via the WordPress repository to mitigate the risk.
Details
- CWE(s)