Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13538: CWE-209 Generation of Error Message Containing Sensitive Information in devsmip BigBuy Dropshipping Connector for WooCommerce

0
Medium
VulnerabilityCVE-2024-13538cvecve-2024-13538cwe-209
Published: Tue Feb 18 2025 (02/18/2025, 04:21:11 UTC)
Source: CVE Database V5
Vendor/Project: devsmip
Product: BigBuy Dropshipping Connector for WooCommerce

Description

CVE-2024-13538 is a medium severity vulnerability in the BigBuy Dropshipping Connector for WooCommerce plugin for WordPress, affecting all versions up to 1. 9. 19. It allows unauthenticated attackers to trigger an error in a specific PHP file (/vendor/cocur/slugify/bin/generate-default. php) that discloses the full filesystem path of the web application. This full path disclosure (CWE-209) can aid attackers in crafting further attacks but does not directly compromise confidentiality, integrity, or availability on its own. Exploitation requires no authentication or user interaction, but the information disclosed is only useful if combined with other vulnerabilities. No known exploits are currently reported in the wild. Organizations using this plugin should patch or restrict access to the vulnerable file to mitigate risk. Countries with significant WooCommerce usage and e-commerce activity are most likely affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:01:52 UTC

Technical Analysis

The BigBuy Dropshipping Connector for WooCommerce plugin for WordPress contains a vulnerability identified as CVE-2024-13538, classified under CWE-209 (Generation of Error Message Containing Sensitive Information). The issue arises because the PHP script located at /vendor/cocur/slugify/bin/generate-default.php is directly accessible via the web and triggers an error that reveals the full filesystem path of the web application. This full path disclosure occurs in all versions up to and including 1.9.19 of the plugin. Since the error message leaks sensitive internal path information, it can assist attackers in reconnaissance activities, such as identifying directory structures and potential locations of other sensitive files or scripts. The vulnerability is exploitable remotely without any authentication or user interaction, making it accessible to unauthenticated attackers. However, the disclosed information alone does not lead to immediate compromise; it requires chaining with other vulnerabilities to cause significant damage. The CVSS v3.1 base score is 5.3 (medium), reflecting limited confidentiality impact and no impact on integrity or availability. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is primarily a security information leak that can facilitate further targeted attacks against affected WordPress installations using this plugin.

Potential Impact

The primary impact of CVE-2024-13538 is information disclosure, specifically revealing the full filesystem path of the web application hosting the vulnerable plugin. While this does not directly compromise data confidentiality, integrity, or availability, it provides attackers with valuable intelligence that can be leveraged to identify other vulnerabilities or misconfigurations. For organizations running e-commerce sites on WordPress with the BigBuy Dropshipping Connector plugin, this could increase the risk of targeted attacks such as local file inclusion, remote code execution, or privilege escalation if other vulnerabilities exist. The ease of exploitation (no authentication or user interaction required) increases the likelihood of reconnaissance attempts. However, since the disclosed information alone is not sufficient to cause damage, the overall risk remains medium. Organizations with sensitive customer data or critical e-commerce operations could face increased exposure if attackers combine this vulnerability with others. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-13538, organizations should take the following specific actions: 1) Immediately update the BigBuy Dropshipping Connector for WooCommerce plugin to a patched version once available from the vendor. If no patch is currently released, consider temporarily disabling or removing the plugin to eliminate exposure. 2) Restrict direct web access to the /vendor/cocur/slugify/bin/generate-default.php file by configuring web server rules (e.g., .htaccess for Apache or location blocks for Nginx) to deny all HTTP requests to this path. 3) Implement web application firewall (WAF) rules to detect and block requests attempting to access known vulnerable paths or trigger error messages. 4) Review and harden error handling and logging configurations to avoid exposing sensitive internal information in error responses. 5) Conduct a comprehensive vulnerability assessment of the WordPress environment to identify and remediate other potential vulnerabilities that could be chained with this information disclosure. 6) Monitor logs for unusual access patterns targeting the vulnerable file or error messages indicative of exploitation attempts. 7) Educate development and operations teams about secure coding practices to prevent information leakage in error messages.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-20T15:35:29.164Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e5fb7ef31ef0b59f166

Added to database: 2/25/2026, 9:49:19 PM

Last enriched: 2/26/2026, 12:01:52 AM

Last updated: 2/26/2026, 6:34:37 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats