Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12421: CWE-94 Improper Control of Generation of Code ('Code Injection') in elliotvs Coupon Affiliates – Affiliate Plugin for WooCommerce

0
Medium
VulnerabilityCVE-2024-12421cvecve-2024-12421cwe-94
Published: Fri Dec 13 2024 (12/13/2024, 08:24:49 UTC)
Source: CVE Database V5
Vendor/Project: elliotvs
Product: Coupon Affiliates – Affiliate Plugin for WooCommerce

Description

CVE-2024-12421 is a medium severity vulnerability in the Coupon Affiliates – Affiliate Plugin for WooCommerce affecting all versions up to 5. 16. 7. 1. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode, leading to code injection. This flaw also includes a reflected cross-site scripting (XSS) vulnerability, which was fixed in version 5. 16. 7. 1. The arbitrary shortcode execution was patched in version 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:58:02 UTC

Technical Analysis

The Coupon Affiliates – Affiliate Plugin for WooCommerce, developed by elliotvs, suffers from a code injection vulnerability classified as CWE-94, due to improper control over the generation of code via WordPress shortcodes. Specifically, the plugin fails to properly validate user-supplied input before passing it to the WordPress function do_shortcode, which processes shortcode tags embedded in content. This vulnerability allows unauthenticated attackers to craft requests that execute arbitrary shortcodes, effectively enabling remote code execution within the context of the WordPress site. Additionally, the plugin was vulnerable to reflected cross-site scripting (XSS), which could be used to steal session tokens or perform actions on behalf of users. The XSS issue was addressed in version 5.16.7.1, while the more severe arbitrary shortcode execution was fixed in version 5.16.7.2. The vulnerability affects all versions up to and including 5.16.7.1. The CVSS 3.1 base score is 6.5, reflecting network attack vector, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk for WordPress sites using this plugin.

Potential Impact

If exploited, this vulnerability can allow attackers to execute arbitrary shortcodes, which may lead to unauthorized code execution within the WordPress environment. This can compromise site integrity, allowing attackers to manipulate content, escalate privileges, or deploy further malicious payloads such as backdoors or malware. The reflected XSS vulnerability could enable session hijacking or phishing attacks against site administrators or users. Since no authentication is required, any remote attacker can attempt exploitation, increasing the threat surface. For organizations relying on WooCommerce and this plugin for affiliate marketing or coupon management, exploitation could result in data breaches, loss of customer trust, defacement, or disruption of e-commerce operations. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the potential impact if weaponized.

Mitigation Recommendations

Organizations should immediately update the Coupon Affiliates – Affiliate Plugin for WooCommerce to version 5.16.7.2 or later, where both the arbitrary shortcode execution and reflected XSS vulnerabilities are patched. Until the update is applied, administrators should consider disabling the plugin or restricting access to its functionality via web application firewalls (WAF) or IP whitelisting to reduce exposure. Monitoring web server logs for suspicious requests containing shortcode payloads can help detect attempted exploitation. Employing security plugins that limit shortcode execution or sanitize inputs can add an additional layer of defense. Regularly auditing installed plugins for updates and vulnerabilities is critical. Additionally, enforcing the principle of least privilege for WordPress users and backing up site data frequently will aid in recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-10T16:23:29.101Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e3bb7ef31ef0b59896f

Added to database: 2/25/2026, 9:48:43 PM

Last enriched: 2/26/2026, 4:58:02 AM

Last updated: 2/26/2026, 9:13:37 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats