Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13708: CWE-434 Unrestricted Upload of File with Dangerous Type in pluggabl Booster for WooCommerce

0
High
VulnerabilityCVE-2024-13708cvecve-2024-13708cwe-434
Published: Fri Apr 04 2025 (04/04/2025, 05:22:46 UTC)
Source: CVE Database V5
Vendor/Project: pluggabl
Product: Booster for WooCommerce

Description

CVE-2024-13708 is a high-severity vulnerability in the Booster for WooCommerce WordPress plugin, versions 4. 0. 1 to 7. 2. 4, allowing unauthenticated attackers to upload SVG files containing malicious scripts. Due to insufficient input sanitization and output escaping, these SVG files can trigger stored cross-site scripting (XSS) attacks when accessed by users. The vulnerability requires no authentication or user interaction to exploit and can compromise confidentiality and integrity of affected sites. While no known exploits are currently in the wild, the vulnerability's ease of exploitation and scope make it a significant risk for WooCommerce sites using this plugin. Organizations should prioritize patching or applying mitigations to prevent arbitrary script execution and potential account compromise or data theft. Countries with large e-commerce markets and widespread WordPress use are most at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:26:32 UTC

Technical Analysis

CVE-2024-13708 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Booster for WooCommerce plugin for WordPress, specifically versions from 4.0.1 through 7.2.4. The flaw arises from inadequate input sanitization and output escaping of SVG file uploads, which allows unauthenticated attackers to upload SVG files embedded with malicious JavaScript. When these SVG files are accessed by users, the embedded scripts execute, resulting in stored cross-site scripting (XSS). This type of XSS is particularly dangerous because the malicious payload is stored on the server and served to any user visiting the affected page, potentially leading to session hijacking, credential theft, or further exploitation of the victim’s browser. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (no physical or local access required), low attack complexity, no privileges or user interaction needed, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable plugin. Although no public exploits have been reported yet, the vulnerability’s characteristics make it a prime target for attackers seeking to compromise WooCommerce-based e-commerce sites. The plugin’s popularity in the WordPress ecosystem increases the potential attack surface. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps.

Potential Impact

The primary impact of CVE-2024-13708 is the compromise of confidentiality and integrity of affected WooCommerce sites and their users. Successful exploitation allows attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to theft of session cookies, user credentials, or other sensitive information. This can facilitate account takeover, unauthorized transactions, or further lateral movement within the victim’s environment. The stored nature of the XSS means that every user accessing the infected SVG file is at risk, amplifying the potential damage. For organizations relying on WooCommerce for e-commerce, this can result in loss of customer trust, financial losses, and reputational damage. Additionally, attackers could use the vulnerability as a foothold to deploy malware or conduct phishing campaigns targeting site visitors. Given the widespread use of WordPress and WooCommerce globally, the threat has a broad potential impact, especially on small to medium-sized businesses that may lack robust security monitoring.

Mitigation Recommendations

To mitigate CVE-2024-13708, organizations should first check for and apply any official patches or updates released by the plugin vendor as soon as they become available. In the absence of a patch, immediate steps include disabling SVG file uploads within the Booster for WooCommerce plugin or restricting upload capabilities to trusted users only. Implementing a web application firewall (WAF) with rules to detect and block malicious SVG payloads can provide an additional layer of defense. Site administrators should also sanitize and validate all uploaded files rigorously, ensuring that SVG files do not contain embedded scripts or dangerous content. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regular security audits and monitoring of upload directories for suspicious files are recommended. Finally, educating site users and administrators about the risks of untrusted file uploads and maintaining regular backups will aid in rapid recovery if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-24T14:31:43.838Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e6ab7ef31ef0b5a03be

Added to database: 2/25/2026, 9:49:30 PM

Last enriched: 2/25/2026, 10:26:32 PM

Last updated: 2/26/2026, 7:44:38 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats