CVE-2024-13558: CWE-639 Authorization Bypass Through User-Controlled Key in gplsaver NP Quote Request for WooCommerce
CVE-2024-13558 is a high severity vulnerability in the NP Quote Request for WooCommerce WordPress plugin, affecting all versions up to 1. 9. 179. It is an Insecure Direct Object Reference (IDOR) issue caused by missing validation on a user-controlled key, allowing unauthenticated attackers to access the content of quote requests. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently reported in the wild, the vulnerability poses a significant confidentiality risk by exposing potentially sensitive customer quote data. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data disclosure. The impact is primarily on confidentiality, with no integrity or availability effects. Countries with high WooCommerce adoption and significant e-commerce activity are most at risk. The CVSS score is 7.
AI Analysis
Technical Summary
CVE-2024-13558 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the NP Quote Request for WooCommerce plugin for WordPress. This plugin allows customers to request quotes for products, and the vulnerability arises because the plugin fails to properly validate a user-supplied key parameter when accessing quote request data. Due to this missing validation, an unauthenticated attacker can manipulate the key to directly access quote requests belonging to other users, leading to an Insecure Direct Object Reference (IDOR) scenario. The vulnerability affects all versions up to and including 1.9.179. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The primary impact is unauthorized disclosure of sensitive quote request information, which may include customer details and pricing information. The CVSS v3.1 base score is 7.5, indicating a high severity level due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known, the vulnerability represents a significant risk to confidentiality for affected WooCommerce sites. No patches have been linked yet, so mitigation may require temporary workarounds or plugin deactivation until an update is available.
Potential Impact
The primary impact of CVE-2024-13558 is the unauthorized disclosure of sensitive customer quote requests, which can include personal information and pricing details. This breach of confidentiality can lead to privacy violations, loss of customer trust, and potential regulatory compliance issues, especially under data protection laws like GDPR or CCPA. Since the vulnerability does not affect data integrity or availability, attackers cannot modify or disrupt services but can harvest sensitive data at scale. Organizations running WooCommerce with this vulnerable plugin risk exposure of business-sensitive pricing strategies and customer data, which could be leveraged for competitive intelligence or phishing attacks. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated scanning and exploitation attempts. This could lead to widespread data leakage across many e-commerce sites using the plugin globally.
Mitigation Recommendations
1. Immediately audit all WooCommerce sites using the NP Quote Request plugin to identify affected versions (up to 1.9.179). 2. Disable or deactivate the NP Quote Request plugin until a security patch or update is released by the vendor. 3. Monitor official vendor channels and WordPress plugin repositories for security updates or patches addressing CVE-2024-13558. 4. Implement web application firewall (WAF) rules to block or restrict access to the vulnerable endpoints, especially requests containing suspicious or unexpected key parameters. 5. Conduct thorough access logging and monitoring to detect unusual access patterns to quote request data. 6. Educate site administrators on the risks of using outdated plugins and enforce strict plugin update policies. 7. If immediate patching is not possible, consider custom code fixes to validate user keys or restrict access to quote requests based on authenticated user sessions. 8. Review and strengthen overall WordPress site security, including limiting plugin usage to trusted and actively maintained components.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13558: CWE-639 Authorization Bypass Through User-Controlled Key in gplsaver NP Quote Request for WooCommerce
Description
CVE-2024-13558 is a high severity vulnerability in the NP Quote Request for WooCommerce WordPress plugin, affecting all versions up to 1. 9. 179. It is an Insecure Direct Object Reference (IDOR) issue caused by missing validation on a user-controlled key, allowing unauthenticated attackers to access the content of quote requests. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently reported in the wild, the vulnerability poses a significant confidentiality risk by exposing potentially sensitive customer quote data. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data disclosure. The impact is primarily on confidentiality, with no integrity or availability effects. Countries with high WooCommerce adoption and significant e-commerce activity are most at risk. The CVSS score is 7.
AI-Powered Analysis
Technical Analysis
CVE-2024-13558 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the NP Quote Request for WooCommerce plugin for WordPress. This plugin allows customers to request quotes for products, and the vulnerability arises because the plugin fails to properly validate a user-supplied key parameter when accessing quote request data. Due to this missing validation, an unauthenticated attacker can manipulate the key to directly access quote requests belonging to other users, leading to an Insecure Direct Object Reference (IDOR) scenario. The vulnerability affects all versions up to and including 1.9.179. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The primary impact is unauthorized disclosure of sensitive quote request information, which may include customer details and pricing information. The CVSS v3.1 base score is 7.5, indicating a high severity level due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known, the vulnerability represents a significant risk to confidentiality for affected WooCommerce sites. No patches have been linked yet, so mitigation may require temporary workarounds or plugin deactivation until an update is available.
Potential Impact
The primary impact of CVE-2024-13558 is the unauthorized disclosure of sensitive customer quote requests, which can include personal information and pricing details. This breach of confidentiality can lead to privacy violations, loss of customer trust, and potential regulatory compliance issues, especially under data protection laws like GDPR or CCPA. Since the vulnerability does not affect data integrity or availability, attackers cannot modify or disrupt services but can harvest sensitive data at scale. Organizations running WooCommerce with this vulnerable plugin risk exposure of business-sensitive pricing strategies and customer data, which could be leveraged for competitive intelligence or phishing attacks. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated scanning and exploitation attempts. This could lead to widespread data leakage across many e-commerce sites using the plugin globally.
Mitigation Recommendations
1. Immediately audit all WooCommerce sites using the NP Quote Request plugin to identify affected versions (up to 1.9.179). 2. Disable or deactivate the NP Quote Request plugin until a security patch or update is released by the vendor. 3. Monitor official vendor channels and WordPress plugin repositories for security updates or patches addressing CVE-2024-13558. 4. Implement web application firewall (WAF) rules to block or restrict access to the vulnerable endpoints, especially requests containing suspicious or unexpected key parameters. 5. Conduct thorough access logging and monitoring to detect unusual access patterns to quote request data. 6. Educate site administrators on the risks of using outdated plugins and enforce strict plugin update policies. 7. If immediate patching is not possible, consider custom code fixes to validate user keys or restrict access to quote requests based on authenticated user sessions. 8. Review and strengthen overall WordPress site security, including limiting plugin usage to trusted and actively maintained components.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-20T22:32:09.171Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e60b7ef31ef0b59f2f6
Added to database: 2/25/2026, 9:49:20 PM
Last enriched: 2/25/2026, 11:27:01 PM
Last updated: 2/26/2026, 6:37:35 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.