CVE-2024-13525: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in algoritmika Customer Email Verification for WooCommerce
CVE-2024-13525 is a medium severity vulnerability in the Customer Email Verification for WooCommerce WordPress plugin (up to version 2. 9. 4) that allows authenticated users with Contributor-level access or higher to extract sensitive information, including user emails and hashed passwords, via shortcode exploitation. The vulnerability arises from improper exposure of sensitive data (CWE-200) without adequate access controls. Exploitation requires no user interaction beyond having contributor or higher privileges, and it can be performed remotely over the network. While no known exploits are currently observed in the wild, the impact on confidentiality is high, as attackers can access sensitive user data. The vulnerability does not affect integrity or availability. Organizations using this plugin on WordPress e-commerce sites are at risk, especially those with multiple contributors. Mitigation involves restricting shortcode usage, applying any available patches promptly, and auditing user roles and permissions. Countries with significant WooCommerce and WordPress usage, such as the United States, United Kingdom, Germany, Canada, Australia, and others, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2024-13525 is a vulnerability identified in the Customer Email Verification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.9.4. The flaw is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, authenticated users with at least Contributor-level privileges can exploit a shortcode feature to retrieve sensitive data, including email addresses and hashed passwords of any user on the site. The vulnerability stems from insufficient access control checks on the shortcode functionality, allowing privilege escalation within the application context. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity (I:N), and no availability impact (A:N). This means an attacker must be authenticated with contributor or higher privileges but can remotely exploit the vulnerability without additional user interaction. The exposure of hashed passwords and emails can facilitate further attacks such as credential stuffing, phishing, or social engineering. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many organizations relying on these platforms.
Potential Impact
The primary impact of CVE-2024-13525 is the unauthorized disclosure of sensitive user information, specifically email addresses and hashed passwords. This breach of confidentiality can lead to secondary attacks such as credential stuffing, phishing campaigns, and targeted social engineering attacks. Organizations operating WooCommerce stores with multiple contributors or editors are at higher risk, as these roles can exploit the vulnerability. While the integrity and availability of the system are not directly affected, the loss of sensitive data can damage customer trust, lead to regulatory compliance issues (e.g., GDPR, CCPA), and potentially result in financial losses due to fraud or remediation costs. The vulnerability's exploitation requires authenticated access, which somewhat limits the attack surface but does not eliminate risk, especially in environments with many contributors or where account compromise is possible. Given WooCommerce's global popularity, the impact can be widespread across various industries relying on WordPress e-commerce solutions.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user access to trusted personnel only, minimizing the number of users with such privileges. 2. Disable or restrict the use of the vulnerable shortcode in the Customer Email Verification plugin until a patch is available. 3. Monitor and audit user roles and permissions regularly to detect any unauthorized privilege escalations. 4. Implement strong authentication mechanisms (e.g., MFA) to reduce the risk of account compromise for contributors and higher roles. 5. Keep WordPress core, WooCommerce, and all plugins up to date; apply security patches promptly once the vendor releases a fix for this vulnerability. 6. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege boundaries. 7. Consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode usage patterns. 8. Educate site administrators and developers about the risks of exposing sensitive data through shortcode or other plugin features. 9. Backup site data regularly to enable recovery in case of compromise. 10. Review and limit the exposure of sensitive data in plugin outputs and logs to reduce risk.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-13525: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in algoritmika Customer Email Verification for WooCommerce
Description
CVE-2024-13525 is a medium severity vulnerability in the Customer Email Verification for WooCommerce WordPress plugin (up to version 2. 9. 4) that allows authenticated users with Contributor-level access or higher to extract sensitive information, including user emails and hashed passwords, via shortcode exploitation. The vulnerability arises from improper exposure of sensitive data (CWE-200) without adequate access controls. Exploitation requires no user interaction beyond having contributor or higher privileges, and it can be performed remotely over the network. While no known exploits are currently observed in the wild, the impact on confidentiality is high, as attackers can access sensitive user data. The vulnerability does not affect integrity or availability. Organizations using this plugin on WordPress e-commerce sites are at risk, especially those with multiple contributors. Mitigation involves restricting shortcode usage, applying any available patches promptly, and auditing user roles and permissions. Countries with significant WooCommerce and WordPress usage, such as the United States, United Kingdom, Germany, Canada, Australia, and others, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-13525 is a vulnerability identified in the Customer Email Verification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.9.4. The flaw is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. Specifically, authenticated users with at least Contributor-level privileges can exploit a shortcode feature to retrieve sensitive data, including email addresses and hashed passwords of any user on the site. The vulnerability stems from insufficient access control checks on the shortcode functionality, allowing privilege escalation within the application context. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity (I:N), and no availability impact (A:N). This means an attacker must be authenticated with contributor or higher privileges but can remotely exploit the vulnerability without additional user interaction. The exposure of hashed passwords and emails can facilitate further attacks such as credential stuffing, phishing, or social engineering. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many organizations relying on these platforms.
Potential Impact
The primary impact of CVE-2024-13525 is the unauthorized disclosure of sensitive user information, specifically email addresses and hashed passwords. This breach of confidentiality can lead to secondary attacks such as credential stuffing, phishing campaigns, and targeted social engineering attacks. Organizations operating WooCommerce stores with multiple contributors or editors are at higher risk, as these roles can exploit the vulnerability. While the integrity and availability of the system are not directly affected, the loss of sensitive data can damage customer trust, lead to regulatory compliance issues (e.g., GDPR, CCPA), and potentially result in financial losses due to fraud or remediation costs. The vulnerability's exploitation requires authenticated access, which somewhat limits the attack surface but does not eliminate risk, especially in environments with many contributors or where account compromise is possible. Given WooCommerce's global popularity, the impact can be widespread across various industries relying on WordPress e-commerce solutions.
Mitigation Recommendations
1. Immediately restrict Contributor-level and higher user access to trusted personnel only, minimizing the number of users with such privileges. 2. Disable or restrict the use of the vulnerable shortcode in the Customer Email Verification plugin until a patch is available. 3. Monitor and audit user roles and permissions regularly to detect any unauthorized privilege escalations. 4. Implement strong authentication mechanisms (e.g., MFA) to reduce the risk of account compromise for contributors and higher roles. 5. Keep WordPress core, WooCommerce, and all plugins up to date; apply security patches promptly once the vendor releases a fix for this vulnerability. 6. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege boundaries. 7. Consider using web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode usage patterns. 8. Educate site administrators and developers about the risks of exposing sensitive data through shortcode or other plugin features. 9. Backup site data regularly to enable recovery in case of compromise. 10. Review and limit the exposure of sensitive data in plugin outputs and logs to reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-17T21:44:08.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e5eb7ef31ef0b59efdc
Added to database: 2/25/2026, 9:49:18 PM
Last enriched: 2/26/2026, 12:15:35 AM
Last updated: 2/26/2026, 8:07:34 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.