Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12210: CWE-862 Missing Authorization in tychesoftwares Print Invoice & Delivery Notes for WooCommerce

0
Medium
VulnerabilityCVE-2024-12210cvecve-2024-12210cwe-862
Published: Tue Dec 24 2024 (12/24/2024, 05:23:43 UTC)
Source: CVE Database V5
Vendor/Project: tychesoftwares
Product: Print Invoice & Delivery Notes for WooCommerce

Description

CVE-2024-12210 is a medium-severity vulnerability in the Print Invoice & Delivery Notes for WooCommerce WordPress plugin that allows authenticated users with Subscriber-level access or higher to remove the shop's logo without proper authorization checks. The flaw arises from a missing capability check on the 'wcdn_remove_shoplogo' AJAX action, enabling unauthorized modification of shop branding. Exploitation does not require user interaction and has a low attack complexity, but it does require at least low-level authenticated access. While the impact is limited to integrity (modification of shop logos), it could be used to facilitate phishing or undermine brand trust. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or applying compensating controls to restrict access to AJAX actions. Countries with large WooCommerce user bases and e-commerce activity, such as the United States, United Kingdom, Germany, Australia, Canada, and India, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:01:11 UTC

Technical Analysis

CVE-2024-12210 is a vulnerability identified in the Print Invoice & Delivery Notes for WooCommerce plugin for WordPress, affecting all versions up to and including 5.4.0. The vulnerability stems from a missing authorization check on the AJAX action 'wcdn_remove_shoplogo', which is intended to allow removal of the shop's logo. Due to the absence of proper capability verification, any authenticated user with Subscriber-level permissions or higher can invoke this AJAX endpoint to remove the shop logo without additional privileges. This represents a CWE-862 (Missing Authorization) weakness. The vulnerability has a CVSS 3.1 base score of 4.3 (medium severity), with attack vector network (remote), low attack complexity, requiring privileges (authenticated user), no user interaction, and an impact limited to integrity (modification of data) without affecting confidentiality or availability. The flaw could be exploited by malicious users to alter the shop's branding, potentially facilitating social engineering or phishing attacks by undermining customer trust. Although no public exploits are known, the vulnerability is present in a widely used e-commerce plugin, making it a relevant concern for many WordPress sites. The issue highlights the importance of enforcing capability checks on all AJAX actions to prevent unauthorized modifications by low-privilege users.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of the shop's logo, which affects the integrity of the e-commerce site’s branding. While it does not compromise confidentiality or availability, altering the shop logo can erode customer trust, potentially enabling phishing or fraud schemes that impersonate the legitimate store. Attackers with Subscriber-level access, which is commonly granted to registered users or customers, can exploit this flaw remotely without user interaction, increasing the risk of exploitation in multi-user environments. For organizations relying on WooCommerce for online sales, this could lead to reputational damage and loss of customer confidence. However, since the vulnerability requires authenticated access, the risk is somewhat mitigated in environments with strict user registration and monitoring policies. There is no evidence of widespread exploitation, but the vulnerability remains a concern for any WooCommerce installation using the affected plugin version.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Print Invoice & Delivery Notes for WooCommerce plugin to a version that includes the proper authorization checks once available. In the absence of an official patch, administrators can implement the following specific measures: 1) Restrict user roles to the minimum necessary privileges, avoiding granting Subscriber-level or higher access to untrusted users. 2) Use WordPress security plugins or custom code to enforce capability checks on AJAX actions, particularly 'wcdn_remove_shoplogo', by hooking into WordPress AJAX handlers and validating user permissions. 3) Monitor logs for suspicious AJAX requests targeting this action to detect potential exploitation attempts. 4) Consider temporarily disabling the plugin or the specific AJAX functionality if feasible until a patch is released. 5) Educate site administrators and users about the risks of unauthorized changes to branding elements and encourage vigilance for unexpected site appearance changes. These targeted steps go beyond generic advice by focusing on controlling access to the vulnerable AJAX endpoint and monitoring for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T17:56:36.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e32b7ef31ef0b59797e

Added to database: 2/25/2026, 9:48:34 PM

Last enriched: 2/26/2026, 6:01:11 AM

Last updated: 2/26/2026, 9:25:05 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats