A number of safety vulnerabilities have been discovered within the WooCommerce Amazon Associates (WZone) plugin, in response to Patchstack.
This premium WordPress plugin, developed by AA-Crew and boasting over 35,000 gross sales, is designed to help website house owners and bloggers in monetizing their web sites through the Amazon associates program.
The vulnerabilities recognized are severe, impacting all examined variations, together with model 14.0.10 and doubtlessly these from model 14.0.20 onward.
One of many essential points is an authenticated arbitrary possibility replace vulnerability, assigned CVE-2024-33549. This flaw allows authenticated customers to replace arbitrary WP choices, doubtlessly resulting in privilege escalation. This vulnerability, which stays unpatched, might enable attackers to achieve higher-level entry to the WordPress website, posing important safety dangers.
Moreover, the Patchstack examine discovered two forms of SQL injection vulnerabilities, each unauthenticated and authenticated SQL injection, assigned CVE-2024-33544 and CVE-2024-33546, respectively.
These vulnerabilities enable each unauthenticated and authenticated customers to inject malicious SQL queries into the WordPress database, resulting in knowledge breaches or manipulation. The severity of those flaws highlights the necessity for speedy motion from website directors utilizing this plugin.
Patchstack has suggested customers to deactivate and delete the WZone plugin because of the absence of a patched model.
Learn extra on SQL safety: The right way to Backup and Restore Database in SQL Server
Regardless of reported makes an attempt from Patchstack to contact the seller, no response has been acquired, prompting the corporate to publish the vulnerabilities and supply protecting measures for his or her customers.
“An important factor when implementing an motion or course of is to use permission or function and nonce validation. Permission or function test may very well be validated utilizing current_user_can operate and nonce worth may very well be validated utilizing wp_verify_nonce or check_ajax_referer,” reads the technical write-up.
“For the SQL question course of, at all times do a secure escape and format for the consumer’s enter earlier than performing a question, and by no means give arbitrary entry for customers to replace tables on the database.”
Picture credit score: T. Schneider / Shutterstock.com