Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13355: CWE-434 Unrestricted Upload of File with Dangerous Type in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo

0
Medium
VulnerabilityCVE-2024-13355cvecve-2024-13355cwe-434
Published: Thu Jan 16 2025 (01/16/2025, 09:39:14 UTC)
Source: CVE Database V5
Vendor/Project: nmedia
Product: Admin and Customer Messages After Order for WooCommerce: OrderConvo

Description

CVE-2024-13355 is a medium severity vulnerability in the WordPress plugin 'Admin and Customer Messages After Order for WooCommerce: OrderConvo' that allows authenticated users with Subscriber-level access or higher to upload files without proper file type validation. This unrestricted file upload can lead to remote code execution and has been confirmed to enable Cross-Site Scripting (XSS) attacks. The vulnerability stems from insufficient validation in the upload_file() function across all plugin versions up to 13. 2. Exploitation requires authentication and some user interaction, but the attack surface is significant given the plugin's use in WooCommerce environments. There are no known public exploits yet, and no patches have been released at the time of publication. Organizations using this plugin should urgently review user permissions and monitor for suspicious file uploads to mitigate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:59:41 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13355 affects the 'Admin and Customer Messages After Order for WooCommerce: OrderConvo' WordPress plugin, which is widely used to facilitate communication between admins and customers post-purchase. The core issue lies in the upload_file() function, which fails to adequately validate the file types being uploaded by authenticated users, including those with Subscriber-level privileges. This insufficient validation allows attackers to upload potentially malicious files, such as web shells or scripts, which can be executed remotely on the server, leading to remote code execution (RCE). Additionally, the vulnerability has been confirmed to enable Cross-Site Scripting (XSS) attacks, which can be leveraged to hijack user sessions, steal credentials, or perform other malicious actions within the context of the affected site. The CVSS 3.1 base score of 5.4 reflects a medium severity, considering the network attack vector, low attack complexity, requirement for privileges, and user interaction. The scope is changed (S:C) indicating that exploitation can affect resources beyond the initially vulnerable component. No patches or fixes have been published yet, and no known exploits are currently in the wild, but the vulnerability poses a significant risk due to the plugin's popularity in WooCommerce installations. Attackers with subscriber or higher access can exploit this flaw, which means that compromised or malicious low-privilege accounts can escalate their impact. The vulnerability is classified under CWE-434, which relates to unrestricted file upload vulnerabilities that can lead to code execution or other impacts.

Potential Impact

The potential impact of CVE-2024-13355 is substantial for organizations using the affected WooCommerce plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the web server, potentially leading to full site compromise, data theft, or pivoting to internal networks. The confirmed Cross-Site Scripting vulnerability further increases risk by enabling session hijacking, credential theft, or distribution of malware to site visitors. Since the vulnerability requires only Subscriber-level access, attackers can exploit compromised or malicious user accounts with minimal privileges, increasing the attack surface. This can result in significant reputational damage, financial loss, and operational disruption for e-commerce businesses relying on WooCommerce. The lack of available patches means organizations remain exposed until mitigations or updates are applied. Given WooCommerce's widespread use globally, many small to medium-sized businesses could be affected, especially those with less mature security practices.

Mitigation Recommendations

To mitigate CVE-2024-13355, organizations should immediately restrict file upload permissions to trusted users only, ideally limiting uploads to Administrator roles until a patch is available. Implement strict monitoring and logging of file upload activities to detect suspicious or unauthorized uploads. Employ Web Application Firewalls (WAFs) with rules to block common web shell signatures and suspicious file types. Disable or restrict the plugin's file upload functionality if feasible, or replace it with alternative solutions that enforce robust file validation. Conduct thorough audits of user accounts to remove or restrict unnecessary Subscriber-level users and enforce strong authentication mechanisms to reduce the risk of account compromise. Regularly back up website data and files to enable recovery in case of compromise. Stay alert for vendor updates or patches and apply them promptly once released. Additionally, consider deploying Content Security Policy (CSP) headers to mitigate XSS impact and scanning the website for malicious files or scripts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-13T15:44:42.032Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e51b7ef31ef0b59e273

Added to database: 2/25/2026, 9:49:05 PM

Last enriched: 2/26/2026, 1:59:41 AM

Last updated: 2/26/2026, 4:47:46 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats