Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11034: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpbean Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation

0
High
VulnerabilityCVE-2024-11034cvecve-2024-11034cwe-94
Published: Sat Nov 23 2024 (11/23/2024, 11:23:16 UTC)
Source: CVE Database V5
Vendor/Project: wpbean
Product: Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation

Description

CVE-2024-11034 is a high-severity vulnerability in the WordPress plugin 'Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation' by wpbean. It allows unauthenticated attackers to execute arbitrary shortcodes via the fire_contact_form AJAX action due to improper validation before calling do_shortcode. This code injection flaw (CWE-94) affects all plugin versions up to 1. 4. Exploitation requires no authentication or user interaction and can lead to partial confidentiality, integrity, and availability impacts. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and potential impact make it a significant risk for WordPress sites using this plugin. Organizations should prioritize patching or applying mitigations to prevent arbitrary code execution and potential further compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:56:53 UTC

Technical Analysis

The vulnerability identified as CVE-2024-11034 affects the WordPress plugin 'Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation' developed by wpbean. This plugin is commonly used to add quotation request functionality to WooCommerce and Elementor-based e-commerce sites. The flaw arises from the plugin's fire_contact_form AJAX action, which improperly validates input before passing it to WordPress's do_shortcode function. Because do_shortcode executes WordPress shortcodes, an attacker can inject arbitrary shortcode payloads, leading to code injection. This vulnerability is classified under CWE-94, indicating improper control over code generation. The plugin versions up to and including 1.4 are affected, with no patch currently available. The vulnerability is remotely exploitable without authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 7.3 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. While no active exploits have been reported, the potential for executing arbitrary code or commands through shortcode injection could allow attackers to manipulate site content, execute malicious scripts, or disrupt site operations. This poses a significant risk to WordPress sites using this plugin, especially those handling sensitive customer or business data.

Potential Impact

The impact of CVE-2024-11034 is significant for organizations running WordPress sites with the affected plugin. Successful exploitation allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress context. This can compromise site confidentiality by exposing sensitive data, integrity by altering site content or functionality, and availability by causing site disruptions or denial of service. Attackers could potentially escalate privileges or deploy further payloads such as web shells or malware, leading to broader network compromise. E-commerce sites using WooCommerce and Elementor with this plugin are particularly at risk, as customer data and transactional processes could be targeted. The ease of exploitation and lack of authentication requirements increase the likelihood of automated attacks or mass scanning campaigns. Organizations may face reputational damage, financial loss, and regulatory consequences if customer data is compromised or site availability is impacted.

Mitigation Recommendations

To mitigate CVE-2024-11034, organizations should immediately assess their WordPress environments for the presence of the vulnerable plugin. Since no official patch is currently available, consider the following specific actions: 1) Disable or uninstall the 'Request a Quote for WooCommerce and Elementor' plugin until a secure update is released. 2) Implement Web Application Firewall (WAF) rules to block or sanitize requests to the fire_contact_form AJAX endpoint, especially those containing suspicious shortcode patterns. 3) Restrict access to AJAX endpoints by IP or authentication where feasible to reduce exposure. 4) Monitor web server and WordPress logs for unusual or repeated requests targeting the fire_contact_form action. 5) Harden WordPress installations by limiting shortcode usage and reviewing all active shortcodes for security implications. 6) Keep all WordPress core, themes, and plugins updated and subscribe to vendor security advisories for timely patching. 7) Conduct regular security audits and penetration testing focusing on plugin vulnerabilities. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable component and attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-11-08T22:56:26.617Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e04b7ef31ef0b593acf

Added to database: 2/25/2026, 9:47:48 PM

Last enriched: 2/26/2026, 7:56:53 AM

Last updated: 2/26/2026, 9:27:41 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats