CVE-2024-13342: CWE-434 Unrestricted Upload of File with Dangerous Type in pluggabl Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools
CVE-2024-13342 is a high-severity vulnerability in the Booster for WooCommerce WordPress plugin that allows unauthenticated attackers to upload arbitrary files due to missing file type validation. The flaw exists in the 'add_files_to_order' function and affects all versions up to 7. 2. 4. Attackers can upload files with double extensions, potentially leading to remote code execution if the server executes the first extension. Exploitation requires specific server configurations that execute the first extension in a double extension filename. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality, integrity, and availability of affected sites. Organizations using this plugin should urgently update or apply mitigations to prevent exploitation. Countries with significant WooCommerce usage and WordPress hosting are at higher risk.
AI Analysis
Technical Summary
CVE-2024-13342 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Booster for WooCommerce plugin for WordPress, which provides over 100 tools including PDF invoices, abandoned cart recovery, and variation swatches. The vulnerability arises from inadequate validation of uploaded file types in the 'add_files_to_order' function, allowing unauthenticated attackers to upload arbitrary files with dangerous double extensions. This can lead to remote code execution (RCE) if the server is configured to execute the first extension in a double extension filename (e.g., 'shell.php.jpg'). The vulnerability affects all plugin versions up to and including 7.2.4. Exploitation does not require authentication or user interaction but does require a specific server configuration that executes the first extension, which is not common but possible in some environments. The vulnerability impacts the confidentiality, integrity, and availability of the affected WordPress sites by enabling attackers to execute arbitrary code, potentially leading to full site compromise, data theft, or service disruption. Although no known exploits are currently reported in the wild, the high CVSS score (8.1) reflects the significant risk posed by this vulnerability. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The vulnerability allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution and full compromise of affected WordPress sites. This can result in unauthorized access to sensitive customer and business data, defacement or destruction of website content, installation of backdoors or malware, and disruption of e-commerce operations. Organizations relying on Booster for WooCommerce for critical business functions such as invoicing, cart recovery, and product display are at risk of financial loss, reputational damage, and regulatory penalties due to data breaches. The impact extends to any organization using WordPress with this plugin, especially e-commerce businesses that handle payment and customer data. The requirement for specific server configurations to enable RCE limits the scope somewhat but does not eliminate the risk, as many hosting environments may inadvertently be vulnerable. The vulnerability affects confidentiality, integrity, and availability, making it a comprehensive threat to affected systems.
Mitigation Recommendations
1. Immediately update the Booster for WooCommerce plugin to a patched version once available; monitor vendor announcements closely. 2. In the absence of an official patch, disable or restrict file upload functionality in the plugin, especially the 'add_files_to_order' feature. 3. Implement strict server-side file type validation and sanitization to reject files with dangerous or double extensions. 4. Configure web servers to not execute files based on the first extension in double extension filenames; ensure execution is based on the last extension only. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file uploads and requests targeting this vulnerability. 6. Regularly audit and monitor upload directories for unauthorized or suspicious files. 7. Harden WordPress installations by limiting plugin permissions and isolating critical directories. 8. Conduct security awareness training for administrators to recognize and respond to suspicious activity. 9. Maintain regular backups and have an incident response plan ready in case of compromise. 10. Review hosting environment configurations to ensure they do not allow execution of files with double extensions based on the first extension.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-13342: CWE-434 Unrestricted Upload of File with Dangerous Type in pluggabl Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools
Description
CVE-2024-13342 is a high-severity vulnerability in the Booster for WooCommerce WordPress plugin that allows unauthenticated attackers to upload arbitrary files due to missing file type validation. The flaw exists in the 'add_files_to_order' function and affects all versions up to 7. 2. 4. Attackers can upload files with double extensions, potentially leading to remote code execution if the server executes the first extension. Exploitation requires specific server configurations that execute the first extension in a double extension filename. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality, integrity, and availability of affected sites. Organizations using this plugin should urgently update or apply mitigations to prevent exploitation. Countries with significant WooCommerce usage and WordPress hosting are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-13342 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Booster for WooCommerce plugin for WordPress, which provides over 100 tools including PDF invoices, abandoned cart recovery, and variation swatches. The vulnerability arises from inadequate validation of uploaded file types in the 'add_files_to_order' function, allowing unauthenticated attackers to upload arbitrary files with dangerous double extensions. This can lead to remote code execution (RCE) if the server is configured to execute the first extension in a double extension filename (e.g., 'shell.php.jpg'). The vulnerability affects all plugin versions up to and including 7.2.4. Exploitation does not require authentication or user interaction but does require a specific server configuration that executes the first extension, which is not common but possible in some environments. The vulnerability impacts the confidentiality, integrity, and availability of the affected WordPress sites by enabling attackers to execute arbitrary code, potentially leading to full site compromise, data theft, or service disruption. Although no known exploits are currently reported in the wild, the high CVSS score (8.1) reflects the significant risk posed by this vulnerability. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
The vulnerability allows unauthenticated attackers to upload arbitrary files, potentially leading to remote code execution and full compromise of affected WordPress sites. This can result in unauthorized access to sensitive customer and business data, defacement or destruction of website content, installation of backdoors or malware, and disruption of e-commerce operations. Organizations relying on Booster for WooCommerce for critical business functions such as invoicing, cart recovery, and product display are at risk of financial loss, reputational damage, and regulatory penalties due to data breaches. The impact extends to any organization using WordPress with this plugin, especially e-commerce businesses that handle payment and customer data. The requirement for specific server configurations to enable RCE limits the scope somewhat but does not eliminate the risk, as many hosting environments may inadvertently be vulnerable. The vulnerability affects confidentiality, integrity, and availability, making it a comprehensive threat to affected systems.
Mitigation Recommendations
1. Immediately update the Booster for WooCommerce plugin to a patched version once available; monitor vendor announcements closely. 2. In the absence of an official patch, disable or restrict file upload functionality in the plugin, especially the 'add_files_to_order' feature. 3. Implement strict server-side file type validation and sanitization to reject files with dangerous or double extensions. 4. Configure web servers to not execute files based on the first extension in double extension filenames; ensure execution is based on the last extension only. 5. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file uploads and requests targeting this vulnerability. 6. Regularly audit and monitor upload directories for unauthorized or suspicious files. 7. Harden WordPress installations by limiting plugin permissions and isolating critical directories. 8. Conduct security awareness training for administrators to recognize and respond to suspicious activity. 9. Maintain regular backups and have an incident response plan ready in case of compromise. 10. Review hosting environment configurations to ensure they do not allow execution of files with double extensions based on the first extension.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-10T19:50:45.457Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e50b7ef31ef0b59cbaa
Added to database: 2/25/2026, 9:49:04 PM
Last enriched: 2/26/2026, 1:27:24 AM
Last updated: 2/26/2026, 8:43:41 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.