Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13472: CWE-94 Improper Control of Generation of Code ('Code Injection') in wcproducttable WooCommerce Product Table Lite

0
High
VulnerabilityCVE-2024-13472cvecve-2024-13472cwe-94
Published: Fri Jan 31 2025 (01/31/2025, 09:21:23 UTC)
Source: CVE Database V5
Vendor/Project: wcproducttable
Product: WooCommerce Product Table Lite

Description

CVE-2024-13472 is a high-severity vulnerability in the WooCommerce Product Table Lite WordPress plugin, affecting all versions up to 3. 9. 4. It allows unauthenticated attackers to execute arbitrary shortcodes via improper validation of the 'sc_attrs' parameter, leading to code injection. This vulnerability also enables reflected cross-site scripting (XSS) through the same parameter. Exploitation requires no authentication or user interaction and can impact confidentiality, integrity, and availability of affected sites. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing mitigations to prevent potential exploitation. Countries with significant WooCommerce usage and e-commerce activity are at higher risk. The CVSS score is 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:42:25 UTC

Technical Analysis

CVE-2024-13472 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WooCommerce Product Table Lite plugin for WordPress, versions up to and including 3.9.4. The vulnerability arises because the plugin improperly validates input before passing it to the WordPress function do_shortcode, which processes shortcodes. Specifically, the 'sc_attrs' parameter can be manipulated by unauthenticated attackers to inject and execute arbitrary shortcodes. This code injection flaw allows attackers to run malicious code within the context of the WordPress site, potentially leading to unauthorized actions such as data theft, site defacement, or further compromise. Additionally, the same parameter is vulnerable to reflected cross-site scripting (XSS), which can be used to execute malicious scripts in the browsers of site visitors, leading to session hijacking or phishing attacks. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant threat to websites using this plugin. The CVSS v3.1 score of 7.3 reflects a high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, but the impact affects confidentiality, integrity, and availability to some extent. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

The impact of CVE-2024-13472 on organizations worldwide can be substantial, especially for those relying on WooCommerce Product Table Lite for e-commerce functionality. Successful exploitation allows attackers to execute arbitrary shortcodes, which can lead to unauthorized code execution on the server. This can result in data breaches, including theft of customer information, payment data, or administrative credentials. Attackers may also deface websites, inject malicious content, or pivot to further internal network compromise. The reflected XSS vulnerability can be leveraged to target site visitors, potentially leading to credential theft or malware distribution. Given the plugin's widespread use in e-commerce sites, the vulnerability threatens the confidentiality, integrity, and availability of affected systems. The ease of exploitation without authentication or user interaction increases the risk of automated attacks and mass exploitation campaigns. Organizations may face reputational damage, regulatory penalties, and financial losses if exploited. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

To mitigate CVE-2024-13472, organizations should immediately update the WooCommerce Product Table Lite plugin to a patched version once available. Until a patch is released, administrators should consider disabling or removing the plugin if feasible. Implementing a Web Application Firewall (WAF) with custom rules to block requests containing suspicious shortcode parameters, especially targeting the 'sc_attrs' parameter, can reduce exposure. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can limit attacker reach. Monitoring web server logs for unusual shortcode execution attempts or XSS payloads is critical for early detection. Additionally, applying Content Security Policy (CSP) headers can mitigate the impact of reflected XSS attacks. Regular backups and incident response plans should be in place to recover quickly if compromise occurs. Educating site administrators about the risks of installing untrusted plugins and enforcing the principle of least privilege for WordPress users can further reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-16T18:39:10.631Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e59b7ef31ef0b59ec34

Added to database: 2/25/2026, 9:49:13 PM

Last enriched: 2/26/2026, 12:42:25 AM

Last updated: 2/26/2026, 7:13:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats