Cyber Posture

CVE-2024-12600

High

Published: 25 January 2025

Published
25 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0128 79.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The Custom Product Tabs Lite for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.9.0 via deserialization of untrusted input from the 'frs_woo_product_tabs' parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

Security Summary

CVE-2024-12600 is a PHP Object Injection vulnerability (CWE-502) affecting the Custom Product Tabs Lite for WooCommerce plugin for WordPress in all versions up to and including 1.9.0. The flaw arises from deserialization of untrusted input via the 'frs_woo_product_tabs' parameter, enabling authenticated attackers to inject a PHP Object. It has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), reflecting high confidentiality, integrity, and availability impacts under specific conditions.

Authenticated attackers with Shop Manager-level access or higher can exploit this vulnerability over the network with low complexity. While no known Proof-of-Concept (POP) chain exists within the vulnerable plugin itself, the injection could be leveraged if a POP chain is available through an additional plugin or theme on the target system, potentially allowing arbitrary file deletion, sensitive data retrieval, or remote code execution.

Advisories and references, including Wordfence's threat intelligence and WordPress plugin trac details, point to a patch in changeset 3226839, which addresses the deserialization issue around line 372 in the plugin's main file. Security practitioners should update to a patched version of the plugin via the WordPress repository to mitigate the risk.

Details

CWE(s)
CWE-502

References