HIGHCVE-2024-13923CVSS 7.6

Order Export & Order Import for WooCommerce <= 2.6.0 - Requisição Forjada do Lado do Servidor (SSRF) Autenticada (Administrador+) via Função validate_file

Plataforma

wordpress

Componente

order-import-export-for-woocommerce

Corrigido em

2.6.1

AI Confidence: highNVDEPSS 0.1%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2024-13923 describes a Server-Side Request Forgery (SSRF) vulnerability discovered in the Order Export & Order Import for WooCommerce plugin. This flaw allows authenticated attackers with administrator privileges to initiate arbitrary web requests from the plugin, potentially exposing sensitive internal resources. The vulnerability impacts versions of the plugin up to and including 2.6.0. A patch is expected to resolve this issue.

WordPress

Detecte esta CVE no seu projeto

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.

Impacto e Cenários de Ataquetraduzindo…

The SSRF vulnerability in Order Export & Order Import for WooCommerce allows an authenticated administrator to craft malicious requests that target internal services. An attacker could leverage this to query sensitive data, modify configurations, or even gain access to other internal systems that are not directly exposed to the internet. The potential blast radius extends to any internal service accessible from the WordPress server. While requiring administrator privileges, this vulnerability represents a significant risk, particularly in environments with shared hosting or where administrator accounts are poorly secured. Exploitation could lead to data breaches, system compromise, and disruption of business operations.

Contexto de Exploraçãotraduzindo…

CVE-2024-13923 was publicly disclosed on 2025-03-20. The vulnerability is not currently listed on the CISA KEV catalog. Public proof-of-concept (PoC) code is not yet available, but the SSRF nature of the vulnerability makes it likely that PoCs will emerge. Given the ease of exploiting SSRF vulnerabilities, active exploitation is possible.

Quem Está em Riscotraduzindo…

WordPress websites utilizing the Order Export & Order Import for WooCommerce plugin, particularly those with administrator accounts that have broad network access or are susceptible to credential compromise, are at risk. Shared hosting environments where multiple websites share the same server infrastructure are also at increased risk, as a successful exploitation on one site could potentially impact others.

Passos de Detecçãotraduzindo…

• wordpress / composer / npm:

grep -r 'validate_file(' /var/www/html/wp-content/plugins/order-export-order-import-for-woocommerce/*

• generic web:

curl -I <wordpress_site>/wp-content/plugins/order-export-order-import-for-woocommerce/validate_file.php | grep Server

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.13% (percentil 33%)

CISA SSVC

Exploraçãonone
Automatizávelno
Impacto Técnicototal

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N7.6HIGHAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredHighNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeChangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Alto — conta de administrador ou privilegiada necessária.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Alterado — o ataque pode pivotar para além do componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componenteorder-import-export-for-woocommerce
Fornecedorwebtoffee
Faixa afetadaCorrigido em
* – 2.6.02.6.1

Informações do pacote

Instalações ativas
60KConhecido
Avaliação do plugin
4.7
Requer WordPress
3.0+
Compatível até
6.9.4
Requer PHP
5.6+

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. EPSS atualizado
Sem correção — 430 dias desde a divulgação

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2024-13923 is to upgrade the Order Export & Order Import for WooCommerce plugin to a patched version as soon as it becomes available. Until a patch is released, consider implementing temporary workarounds such as restricting outbound network access from the WordPress server using a Web Application Firewall (WAF) or proxy server. Configure the WAF to block requests to internal IP addresses or known sensitive endpoints. Carefully review and restrict the plugin's access to internal resources. After upgrading, confirm the fix by attempting to trigger a request to an internal service through the plugin's functionality and verifying that the request is blocked or fails as expected.

Como corrigir

Atualize o plugin Order Export & Order Import for WooCommerce para a última versão disponível. A vulnerabilidade SSRF (Server-Side Request Forgery) foi corrigida em versões posteriores à 2.6.0.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2024-13923 — SSRF in Order Export & Order Import for WooCommerce?

CVE-2024-13923 is a Server-Side Request Forgery vulnerability affecting versions of the Order Export & Order Import for WooCommerce plugin for WordPress up to and including 2.6.0, allowing authenticated administrators to make arbitrary web requests.

Am I affected by CVE-2024-13923 in Order Export & Order Import for WooCommerce?

You are affected if you are using the Order Export & Order Import for WooCommerce plugin version 2.6.0 or earlier. Check your plugin version and upgrade immediately.

How do I fix CVE-2024-13923 in Order Export & Order Import for WooCommerce?

Upgrade the Order Export & Order Import for WooCommerce plugin to the latest available version as soon as a patch is released. Until then, implement WAF rules to restrict outbound requests.

Is CVE-2024-13923 being actively exploited?

While no active exploitation has been confirmed, the SSRF nature of the vulnerability makes it a likely target, and exploitation is possible.

Where can I find the official Order Export & Order Import for WooCommerce advisory for CVE-2024-13923?

Refer to the plugin developer's website and WordPress plugin repository for the official advisory and patch release information.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.