Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13525: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in algoritmika Customer Email Verification for WooCommerce

0
Medium
VulnerabilityCVE-2024-13525cvecve-2024-13525cwe-200
Published: Sat Feb 15 2025 (02/15/2025, 08:25:06 UTC)
Source: CVE Database V5
Vendor/Project: algoritmika
Product: Customer Email Verification for WooCommerce

Description

CVE-2024-13525 is a medium severity vulnerability in the Customer Email Verification for WooCommerce WordPress plugin (up to version 2. 9. 4) that allows authenticated users with Contributor-level access or higher to extract sensitive information, including user emails and hashed passwords, via shortcode exploitation. The vulnerability arises from improper exposure of sensitive data (CWE-200) without adequate access controls. Exploitation requires no user interaction beyond having contributor or higher privileges, and it can be performed remotely over the network. While no known exploits are currently observed in the wild, the impact on confidentiality is high, as attackers can access sensitive user data. The vulnerability does not affect integrity or availability. Organizations using this plugin on WordPress e-commerce sites are at risk, especially those with multiple contributors. Mitigation involves restricting shortcode usage, applying any available patches promptly, and auditing user roles and permissions. Countries with significant WooCommerce and WordPress usage, such as the United States, United Kingdom, Germany, Canada, Australia, and others, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:15:35 UTC

Technical Analysis

CVE-2024-13525 is a vulnerability identified in the Customer Email Verification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.9.4. The flaw is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, authenticated users with at least Contributor-level privileges can exploit a shortcode feature to retrieve sensitive data, including email addresses and hashed passwords of any user on the site. The vulnerability stems from insufficient access control checks on the shortcode functionality, allowing privilege escalation within the application context. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity (I:N), and no availability impact (A:N). This means an attacker must be authenticated with contributor or higher privileges but can remotely exploit the vulnerability without additional user interaction. The exposure of hashed passwords and emails can facilitate further attacks such as credential stuffing, phishing, or social engineering. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many organizations relying on these platforms.

Potential Impact

The primary impact of CVE-2024-13525 is the unauthorized disclosure of sensitive user information, specifically email addresses and hashed passwords. This breach of confidentiality can lead to secondary attacks such as credential stuffing, phishing campaigns, and targeted social engineering attacks. Organizations operating WooCommerce stores with multiple contributors or editors are at higher risk, as these roles can exploit the vulnerability. While the integrity and availability of the system are not directly affected, the loss of sensitive data can damage customer trust, lead to regulatory compliance issues (e.g., GDPR, CCPA), and potentially result in financial losses due to fraud or remediation costs. The vulnerability's exploitation requires authenticated access, which somewhat limits the attack surface but does not eliminate risk, especially in environments with many contributors or where account compromise is possible. Given WooCommerce's global popularity, the impact can be widespread across various industries relying on WordPress e-commerce solutions.

Mitigation Recommendations

1. Immediately restrict Contributor-level and higher user access to trusted personnel only, minimizing the number of users with such privileges. 2. Disable or restrict the use of the vulnerable shortcode in the Customer Email Verification plugin until a patch is available. 3. Monitor and audit user roles and permissions regularly to detect any unauthorized privilege escalations. 4. Implement strong authentication mechanisms (e.g., MFA) to reduce the risk of account compromise for contributors and higher roles. 5. Keep WordPress core, WooCommerce, and all plugins up to date; apply security patches promptly once the vendor releases a fix for this vulnerability. 6. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege boundaries. 7. Consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode usage patterns. 8. Educate site administrators and developers about the risks of exposing sensitive data through shortcode or other plugin features. 9. Backup site data regularly to enable recovery in case of compromise. 10. Review and limit the exposure of sensitive data in plugin outputs and logs to reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-17T21:44:08.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5eb7ef31ef0b59efdc

Added to database: 2/25/2026, 9:49:18 PM

Last enriched: 2/26/2026, 12:15:35 AM

Last updated: 2/26/2026, 8:07:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats