Skip to main content

CVE-2024-0797: CWE-862 Missing Authorization in realmag777 Active Products Tables for WooCommerce. Professional products tables for WooCommerce store

Medium
VulnerabilityCVE-2024-0797cvecve-2024-0797cwe-862
Published: Mon Feb 05 2024 (02/05/2024, 21:21:32 UTC)
Source: CVE
Vendor/Project: realmag777
Product: Active Products Tables for WooCommerce. Professional products tables for WooCommerce store

Description

The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 1.0.6.1. This makes it possible for subscribers and higher to execute functions intended for admin use.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:43:27 UTC

Technical Analysis

CVE-2024-0797 is a security vulnerability identified in the WordPress plugin 'Active Products Tables for WooCommerce. Professional products tables for WooCommerce store' developed by realmag777. This plugin is designed to enhance WooCommerce stores by providing advanced product table functionalities. The vulnerability is classified under CWE-862, which corresponds to Missing Authorization. Specifically, the issue arises because several functions within the plugin lack proper capability checks, allowing users with subscriber-level privileges or higher to execute functions that are intended exclusively for administrators. This missing authorization check means that authenticated users with relatively low privileges can perform actions that should be restricted, potentially leading to unauthorized modifications or manipulations within the WooCommerce product tables. The vulnerability affects all versions up to and including 1.0.6.1. The CVSS v3.1 base score is 4.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability was published on February 5, 2024, and has been enriched by CISA and Wordfence. The core issue is that subscriber-level users can invoke administrative functions, which could lead to unauthorized changes in product data or configurations, potentially undermining the integrity of the e-commerce platform's product listings.

Potential Impact

For European organizations using WooCommerce with this specific plugin, the vulnerability poses a risk primarily to the integrity of their e-commerce product data. Unauthorized users with subscriber-level access could manipulate product tables, potentially altering product availability, pricing, or descriptions. This could lead to customer confusion, loss of sales, or reputational damage. While the vulnerability does not directly impact confidentiality or availability, the integrity compromise could indirectly affect business operations and customer trust. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs) running online stores, the risk is non-negligible. Attackers exploiting this flaw could also use it as a foothold to perform further malicious activities, such as injecting malicious content or disrupting order processing workflows. The lack of user interaction required and the low complexity of exploitation increase the risk that this vulnerability could be leveraged in automated attacks once exploit code becomes available. However, the requirement for at least subscriber-level privileges limits the attack surface to authenticated users, which somewhat mitigates the risk from external anonymous attackers.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the 'Active Products Tables for WooCommerce. Professional products tables for WooCommerce store' plugin is installed and determine the version in use. Until an official patch is released, administrators should consider the following specific mitigations: 1) Restrict subscriber-level user registrations and review existing subscriber accounts for legitimacy to reduce the risk of malicious exploitation. 2) Temporarily disable or deactivate the vulnerable plugin if it is not critical to business operations. 3) Implement strict role and capability management using WordPress security plugins to enforce additional authorization checks on plugin functions, possibly by custom code or third-party plugins that can override capability checks. 4) Monitor logs for unusual activity from subscriber accounts, focusing on actions related to product table modifications. 5) Limit access to the WordPress admin dashboard and plugin functionalities via IP whitelisting or VPN access where feasible. 6) Stay updated with vendor announcements and apply official patches immediately once available. 7) Consider deploying a Web Application Firewall (WAF) with custom rules to detect and block attempts to invoke administrative functions by unauthorized users. These targeted mitigations go beyond generic advice by focusing on access control hardening and monitoring specific to this vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-01-22T22:26:16.095Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec336

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:43:27 PM

Last updated: 7/26/2025, 5:50:25 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats